Author of the publication

An Auctioning Reputation System Based on Anomaly Detection

, , , , , and . in the Proceedings of the 12 th ACM Conference on Computer and Communications Security (CCS, page 270--279. (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual Cache Line: A New Technique to Improve Cache Exploitation for Recursive Data Structures., , and . CC, volume 1575 of Lecture Notes in Computer Science, page 259-273. Springer, (1999)On the Completeness of Attack Mutation Algorithms., , and . CSFW, page 43-56. IEEE Computer Society, (2006)Protomatching network traffic for high throughputnetwork intrusion detection., , and . CCS, page 47-58. ACM, (2006)Language-Based Generation and Evaluation of NIDS Signatures., , and . S&P, page 3-17. IEEE Computer Society, (2005)Automatic Generation and Analysis of NIDS Attacks., , and . ACSAC, page 28-38. IEEE Computer Society, (2004)Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?, and . Malware Detection, volume 27 of Advances in Information Security, Springer, (2007)Foundations for Intrusion Prevention., , , and . DIMVA, volume P-46 of LNI, page 143-160. GI, (2004)Focusing processor policies via critical-path prediction., , and . ISCA, page 74-85. ACM, (2001)An Auctioning Reputation System Based on Anomaly Detection, , , , , and . in the Proceedings of the 12 th ACM Conference on Computer and Communications Security (CCS, page 270--279. (2005)Foundations for Intrusion Prevention., , and . Prax. Inf.verarb. Kommun., 27 (4): 209-218 (2004)