UNIX network programming
Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
Internetworking with TCP/IP: volume III: client-server programming and applications (Windows sockets version)
An introduction to intrusion detection
Crossroads - Special issue on computer security
On Preventing Intrusions by Process Behavior Monitoring
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
Practical Domain and Type Enforcement for UNIX
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Remus: a security-enhanced operating system
ACM Transactions on Information and System Security (TISSEC)
Web application security assessment by fault injection and behavior monitoring
WWW '03 Proceedings of the 12th international conference on World Wide Web
An approach to usable security based on event monitoring and visualization
Proceedings of the 2002 workshop on New security paradigms
DISE: a programmable macro engine for customizing applications
Proceedings of the 30th annual international symposium on Computer architecture
MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Network-based Intrusion Detection-Modeling for a Larger Picture
LISA '02 Proceedings of the 16th USENIX conference on System administration
Using instruction block signatures to counter code injection attacks
ACM SIGARCH Computer Architecture News - Special issue: Workshop on architectural support for security and anti-virus (WASSA)
A policy flexible architecture for secure operating system
ACM SIGOPS Operating Systems Review
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
A testing framework for Web application security assessment
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Secure coprocessor-based intrusion detection
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
System Call Monitoring Using Authenticated System Calls
IEEE Transactions on Dependable and Secure Computing
Scalable network-based buffer overflow attack detection
Proceedings of the 2006 ACM/IEEE symposium on Architecture for networking and communications systems
Protecting host-based intrusion detectors through virtual machines
Computer Networks: The International Journal of Computer and Telecommunications Networking
Protecting against unexpected system calls
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Transparent Process Monitoring in a Virtual Environment
Electronic Notes in Theoretical Computer Science (ENTCS)
A testing framework for Web application security assessment
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Runtime countermeasures for code injection attacks against C and C++ programs
ACM Computing Surveys (CSUR)
HeapSentry: kernel-assisted protection against heap overflows
DIMVA'13 Proceedings of the 10th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Hi-index | 0.00 |