共 50 条
- [1] Replacement attacks: automatically evading behavior-based software birthmark International Journal of Information Security, 2012, 11 : 293 - 304
- [3] Shadow attacks: automatically evading system-call-behavior based malware detection JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2012, 8 (1-2): : 1 - 13
- [4] Detecting SQL Injection Attacks Using SNORT IDS 2014 ASIA-PACIFIC WORLD CONGRESS ON COMPUTER SCIENCE AND ENGINEERING (APWC ON CSE), 2014,
- [5] DoS Attacks Prevention Using IDS and Data Mining 2016 INTERNATIONAL CONFERENCE ON ACCESSIBILITY TO DIGITAL WORLD (ICADW), 2016, : 86 - 91
- [7] IDS Using Mitigation Rules Approach to Mitigate ICMP Attacks 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, : 54 - 59
- [8] A COMPREHENSIVE IDS TO DETECT BOTNET ATTACKS USING MACHINE LEARNING TECHNIQUES 2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,
- [9] Literature Survey - IDS for DDoS Attacks 2014 CONFERENCE ON IT IN BUSINESS, INDUSTRY AND GOVERNMENT (CSIBIG), 2014,
- [10] Automatically Evading Classifiers A Case Study on PDF Malware Classifiers 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,