![[ICO]](/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](/icons/back.gif) | Parent Directory | | - | |
![[ ]](/icons/layout.gif) | A-Real-Time-IDS-based-on-Learning.pdf | 2006-11-01 16:23 | 284K | |
![[ ]](/icons/layout.gif) | An-Application-of-Machine-Learning-to-Anomaly-Detection.pdf | 2006-11-01 16:23 | 125K | |
![[ ]](/icons/layout.gif) | An-Immunological-Approach-to-Change-Detection-Analysis.pdf | 2006-11-01 16:23 | 438K | |
![[ ]](/icons/layout.gif) | An-Immunological-Approach-to-Change-Detection-Theory.pdf | 2006-11-01 16:23 | 56K | |
![[ ]](/icons/layout.gif) | Automated-Response-Using-System-Call-Delays.pdf | 2006-11-01 16:23 | 104K | |
![[ ]](/icons/layout.gif) | Automating-Mimicry-Attacks-Using-Static-Binary-Analysis.pdf | 2006-11-01 16:23 | 352K | |
![[ ]](/icons/layout.gif) | Detecting-Intrusions-using-System-Calls.pdf | 2006-11-01 16:23 | 183K | |
![[ ]](/icons/layout.gif) | Efficient-ID-using-Automaton-Inlining.pdf | 2006-11-01 16:23 | 381K | |
![[ ]](/icons/layout.gif) | Finding-the-Vocabulary-of-Program-Behavior-Data-for-Anomaly-Detection.pdf | 2006-11-01 16:23 | 127K | |
![[ ]](/icons/layout.gif) | Information-Theoretic-Measures-For-Anomaly-Detection.pdf | 2006-11-01 16:23 | 305K | |
![[ ]](/icons/layout.gif) | Intrusion-Detection-using-Sequences-of-System-Calls.pdf | 2006-11-01 16:23 | 144K | |
![[ ]](/icons/layout.gif) | Learning-Patterns-from-Unix-Process-Execution-Traces.pdf | 2006-11-01 16:23 | 62K | |
![[ ]](/icons/layout.gif) | Learning-Program-Behaviour.pdf | 2006-11-01 16:23 | 216K | |
![[ ]](/icons/layout.gif) | Learning-to-Detect-Malicious-Executables-in-the-Wild.pdf | 2006-11-01 16:23 | 211K | |
![[ ]](/icons/layout.gif) | Modeling-System-Calls-for-IDS.pdf | 2006-11-01 16:23 | 125K | |
![[ ]](/icons/layout.gif) | On-gray-box-program-tracking-for-anomaly-detection.pdf | 2006-11-01 16:23 | 253K | |
![[ ]](/icons/layout.gif) | On-the-Detection-of-Anomalous-System-Call-Arguments.pdf | 2006-11-01 16:23 | 240K | |
![[ ]](/icons/layout.gif) | STATL-An-Attack-Language-for-State-based-ID.pdf | 2006-11-01 16:23 | 502K | |
![[ ]](/icons/layout.gif) | Semantics-Aware-Malware-Detection.pdf | 2006-11-01 16:23 | 279K | |
![[ ]](/icons/layout.gif) | Sequence-Matching-and-Learning-in-Anomaly-Detection-for-Computer-Security.pdf | 2006-11-01 16:23 | 149K | |
![[ ]](/icons/layout.gif) | Seurat-A-Pointillist-Approach-to-Anomaly-Detection.pdf | 2006-11-01 16:23 | 717K | |
![[ ]](/icons/layout.gif) | Temporal-Sequence-Learning-and-Data-Reduction-for-Anomaly-Detection.pdf | 2006-11-01 16:23 | 281K | |
![[ ]](/icons/layout.gif) | Toward-Stealthy-Malware-Detection.pdf | 2006-11-01 16:23 | 861K | |
![[ ]](/icons/layout.gif) | Two-state-based-approaches-to-Program-based-Anomaly-Detection.pdf | 2006-11-01 16:23 | 132K | |
![[ ]](/icons/layout.gif) | USTAT-Real-Time-IDS-for-Unix.pdf | 2006-11-01 16:23 | 14M | |
![[ ]](/icons/layout.gif) | Undermining-Anomaly-based-IDS.pdf | 2006-11-01 16:23 | 156K | |
![[ ]](/icons/layout.gif) | Using-Program-Behavior.pdf | 2006-11-01 16:23 | 179K | |
![[TXT]](/icons/text.gif) | indexdate.html | 2010-11-14 14:12 | 268 | |
![[TXT]](/icons/text.gif) | indexdate2.html | 2010-11-14 14:12 | 268 | |
![[TXT]](/icons/text.gif) | indexsize.html | 2010-11-14 14:12 | 268 | |
![[TXT]](/icons/text.gif) | indexsize2.html | 2010-11-14 14:12 | 268 | |
|