<--- Back to Details
First PageDocument Content
Spamming / Honeypot / Science / Gain / Anagnostakis / Accuracy and precision / Statistics / Thought / Computer network security
Date: 2006-03-17 10:50:55
Spamming
Honeypot
Science
Gain
Anagnostakis
Accuracy and precision
Statistics
Thought
Computer network security

Building a Reactive Immune System for Software Services

Add to Reading List

Source URL: www.fp6-noah.org

Download Document from Source Website

File Size: 402,97 KB

Share Document on Facebook

Similar Documents

An Empirical Study of Real-world Polymorphic Code Injection Attacks Michalis Polychronakis∗ Kostas G. Anagnostakis† Abstract

DocID: 1tpH7 - View Document

Performance Analysis of Content Matching Intrusion Detection Systems S. Antonatos, K. G. Anagnostakis†, E. P. Markatos , M. Polychronakis∗  † Institute of Computer Science

DocID: 1tn9q - View Document

(IJCNS) International Journal of Computer and Network Security, 1 Vol. 2, No. 9, September 2010 Shadow Honeypots Kostas G. Anagnostakis,1 Stelios Sidiroglou,2 Periklis Akritidis,1,3 Michalis Polychronakis,4 Angelos D. Ke

DocID: 1tmwW - View Document

Exclusion-based Signature Matching for Intrusion Detection Evangelos P. Markatos, Spyros Antonatos, Michalis Polychronakis, Kostas G. Anagnostakis ∗ Institute of Computer Science (ICS) Foundation for Research & Technol

DocID: 1ti72 - View Document

Computer network security / Shellcode / Software bugs / Polymorphic code / Buffer overflow / Metasploit Project / Exploit / Conficker / Computer virus / Cyberwarfare / Computer security / Computing

Real-world Polymorphic Attack Detection Michalis Polychronakis,1 Kostas G. Anagnostakis,2 Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hellas, {mikepo, markatos}@ics.fo

DocID: 17SF7 - View Document