Author:
Rachidi Tajjeeddine,Koucham Oualid,Assem Nasser
Publisher
Springer International Publishing
Reference28 articles.
1. Kwon, T., Su, Z.: Automatic detection of unsafe dynamic component loadings. IEEE Trans. Softw. Eng. 38(2), 293–313 (2012). doi: 10.1109/TSE.2011.108
2. Cowan, C., Wagle, P., Pu, C., Beattie, S., Walpole, J.: Buffer overflows: attacks and defenses for the vulnerability of the decade. DARPA Inf. Surviv. Conf. Expo (DISCEX) 2, 119–129 (2000)
3. Pincus, J., Baker, B.: Beyond stack smashing: recent advances in exploiting buffer overruns. IEEE Secur. Priv. 2(4), 20–27 (2004). doi: 10.1109/MSP.2004.36
4. Peyman, K., Ghorbani, A.A.: Research on intrusion detection and response: a survey. Int. J. Netw. Secur. 1, 84–102 (2005)
5. Lazarevic, A., Kumar, V., Jaideep, S.: Intrusion detection: a survey (2005)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. IPMES: A Tool for Incremental TTP Detection Over the System Audit Event Stream;2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);2024-06-24
2. Improving outliers detection in data streams using LiCS and voting;Journal of King Saud University - Computer and Information Sciences;2021-12
3. A Survey of Intrusion Detection Systems Leveraging Host Data;ACM Computing Surveys;2020-11-30
4. A p2p environment to validate ensemble-based approaches in the cybersecurity domain;2020 28th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP);2020-03
5. Probabilistic Real-Time Intrusion Detection System for Docker Containers;Communications in Computer and Information Science;2019