ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
7
views
16
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,283
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Recent Advances in Intrusion Detection
Automated Behavioral Fingerprinting
other
Author(s):
Jérôme François
,
Humberto Abdelnur
,
Radu State
,
Olivier Festor
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Behavioral Public Administration
Most cited references
16
Record
: found
Abstract
: not found
Book Chapter
: not found
A Survey of Clustering Data Mining Techniques
P. Berkhin
(2006)
0
comments
Cited
106
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Report
: not found
SIP: Session Initiation Protocol
J. Rosenberg
,
H. Schulzrinne
,
G. Camarillo
…
(2002)
0
comments
Cited
92
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Efficient algorithms for agglomerative hierarchical clustering methods
William H. E. Day
,
Herbert Edelsbrunner
(1984)
0
comments
Cited
88
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 182-201
DOI:
10.1007/978-3-642-04342-0_10
SO-VID:
198e7926-d49e-4ae4-ba5f-a75dafb16b6f
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems
pp. 21
Protecting a Moving Target: Addressing Web Application Concept Drift
pp. 41
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating
pp. 61
Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems
pp. 81
Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language
pp. 101
Automatic Generation of String Signatures for Malware Detection
pp. 121
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime
pp. 142
Automatically Adapting a Trained Anomaly Detector to Software Patches
pp. 161
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration
pp. 182
Automated Behavioral Fingerprinting
pp. 202
SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection
pp. 224
Keystroke-Based User Identification on Smart Phones
pp. 244
VirusMeter: Preventing Your Cellphone from Spies
pp. 265
Regular Expression Matching on Graphics Hardware for Intrusion Detection
pp. 284
Multi-byte Regular Expression Matching with Speculation
pp. 304
Toward Revealing Kernel Malware Behavior in Virtual Execution Environments
pp. 326
Exploiting Temporal Persistence to Detect Covert Botnet Channels
pp. 346
An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection
pp. 348
Automatic Software Instrumentation for the Detection of Non-control-data Attacks
pp. 350
BLADE: Slashing the Invisible Channel of Drive-by Download Malware
pp. 353
CERN Investigation of Network Behaviour and Anomaly Detection
pp. 355
Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy
pp. 357
Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach
pp. 359
Autonomic Intrusion Detection System
pp. 362
ALICE@home: Distributed Framework for Detecting Malicious Sites
pp. 365
Packet Space Analysis of Intrusion Detection Signatures
pp. 367
Traffic Behaviour Characterization Using NetMate
pp. 369
On the Inefficient Use of Entropy for Anomaly Detection
pp. 371
Browser-Based Intrusion Prevention System
pp. 374
Using Formal Grammar and Genetic Operators to Evolve Malware
pp. 376
Method for Detecting Unknown Malicious Executables
pp. 378
Brave New World: Pervasive Insecurity of Embedded Network Devices
pp. 381
DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks
Similar content
2,283
HPLC fingerprint spectrum and chemical pattern recognition of Radix Hedysari from different habitats of Gansu
Authors:
X.-j. Yang
,
X.-j. Yang
,
S Li
…
Orbital-dependent Fermi Surface shrinking as a fingerprint of nematicity in FeSe
Authors:
Laura Fanfarillo
,
Joseph Mansart
,
Pierre Toulemonde
…
The Cerebro-Morphological Fingerprint of a Progeroid Syndrome: White Matter Changes Correlate with Neurological Symptoms in Xeroderma Pigmentosum
Authors:
Jan Kassubek
,
Anne-Dorte Sperfeld
,
Elmar H Pinkhardt
…
See all similar
Cited by
3
A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets
Authors:
Pedro Sánchez
,
Jose Valero
,
Alberto Celdrán
…
Behavioral fingerprinting of Internet‐of‐Things devices
Authors:
Bruhadeshwar Bezawada
,
Indrakshi Ray
,
Indrajit Ray
Semi-supervised Fingerprinting of Protocol Messages
Authors:
Jerome Francois
,
Humberto Abdelnur
,
Radu State
…
See all cited by