↓ Skip to main content

Recent Advances in Intrusion Detection

Overview of attention for book
Cover of 'Recent Advances in Intrusion Detection'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems
  3. Altmetric Badge
    Chapter 2 Recent Advances in Intrusion Detection
  4. Altmetric Badge
    Chapter 3 Adaptive Anomaly Detection via Self-calibration and Dynamic Updating
  5. Altmetric Badge
    Chapter 4 Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems
  6. Altmetric Badge
    Chapter 5 Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language
  7. Altmetric Badge
    Chapter 6 Automatic Generation of String Signatures for Malware Detection
  8. Altmetric Badge
    Chapter 7 PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime
  9. Altmetric Badge
    Chapter 8 Automatically Adapting a Trained Anomaly Detector to Software Patches
  10. Altmetric Badge
    Chapter 9 Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration
  11. Altmetric Badge
    Chapter 10 Automated Behavioral Fingerprinting
  12. Altmetric Badge
    Chapter 11 SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection
  13. Altmetric Badge
    Chapter 12 Keystroke-Based User Identification on Smart Phones
  14. Altmetric Badge
    Chapter 13 VirusMeter: Preventing Your Cellphone from Spies
  15. Altmetric Badge
    Chapter 14 Regular Expression Matching on Graphics Hardware for Intrusion Detection
  16. Altmetric Badge
    Chapter 15 Multi-byte Regular Expression Matching with Speculation
  17. Altmetric Badge
    Chapter 16 Toward Revealing Kernel Malware Behavior in Virtual Execution Environments
  18. Altmetric Badge
    Chapter 17 Exploiting Temporal Persistence to Detect Covert Botnet Channels
  19. Altmetric Badge
    Chapter 18 Recent Advances in Intrusion Detection
  20. Altmetric Badge
    Chapter 19 Automatic Software Instrumentation for the Detection of Non-control-data Attacks
  21. Altmetric Badge
    Chapter 20 BLADE: Slashing the Invisible Channel of Drive-by Download Malware
  22. Altmetric Badge
    Chapter 21 CERN Investigation of Network Behaviour and Anomaly Detection
  23. Altmetric Badge
    Chapter 22 Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy
  24. Altmetric Badge
    Chapter 23 Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach
  25. Altmetric Badge
    Chapter 24 Autonomic Intrusion Detection System
  26. Altmetric Badge
    Chapter 25 ALICE@home: Distributed Framework for Detecting Malicious Sites
  27. Altmetric Badge
    Chapter 26 Packet Space Analysis of Intrusion Detection Signatures
  28. Altmetric Badge
    Chapter 27 Traffic Behaviour Characterization Using NetMate
  29. Altmetric Badge
    Chapter 28 On the Inefficient Use of Entropy for Anomaly Detection
  30. Altmetric Badge
    Chapter 29 Browser-Based Intrusion Prevention System
  31. Altmetric Badge
    Chapter 30 Using Formal Grammar and Genetic Operators to Evolve Malware
  32. Altmetric Badge
    Chapter 31 Method for Detecting Unknown Malicious Executables
  33. Altmetric Badge
    Chapter 32 Brave New World: Pervasive Insecurity of Embedded Network Devices
  34. Altmetric Badge
    Chapter 33 DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks
Attention for Chapter 8: Automatically Adapting a Trained Anomaly Detector to Software Patches
Altmetric Badge

Readers on

mendeley
15 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Automatically Adapting a Trained Anomaly Detector to Software Patches
Chapter number 8
Book title
Recent Advances in Intrusion Detection
Published by
Springer, Berlin, Heidelberg, September 2009
DOI 10.1007/978-3-642-04342-0_8
Book ISBNs
978-3-64-204341-3, 978-3-64-204342-0
Authors

Peng Li, Debin Gao, Michael K. Reiter

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 15 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Malaysia 1 7%
United States 1 7%
China 1 7%
Unknown 12 80%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 7 47%
Researcher 3 20%
Student > Master 3 20%
Student > Bachelor 1 7%
Other 1 7%
Other 0 0%
Readers by discipline Count As %
Computer Science 13 87%
Pharmacology, Toxicology and Pharmaceutical Science 1 7%
Engineering 1 7%