A gray-box DPDA-based intrusion detection technique using system-call monitoring. Jafarian, J. H., Abbasi, A., & Sheikhabadi, S. S. In The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS 2011, Perth, Australia, September 1-2, 2011, Proceedings, pages 1–12, 2011. ACM.
Paper doi bibtex @inproceedings{DBLP:conf/ceas/JafarianAS11,
author = {Jafar Haadi Jafarian and
Ali Abbasi and
Siavash Safaei Sheikhabadi},
editor = {Vidyasagar M. Potdar},
title = {A gray-box DPDA-based intrusion detection technique using system-call
monitoring},
booktitle = {The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and
Spam Conference, {CEAS} 2011, Perth, Australia, September 1-2, 2011,
Proceedings},
pages = {1--12},
publisher = {{ACM}},
year = {2011},
url = {https://doi.org/10.1145/2030376.2030377},
doi = {10.1145/2030376.2030377},
timestamp = {Fri, 28 Oct 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ceas/JafarianAS11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"rpdEn5BotyuRwmmk7","bibbaseid":"jafarian-abbasi-sheikhabadi-agrayboxdpdabasedintrusiondetectiontechniqueusingsystemcallmonitoring-2011","authorIDs":["8GDRtnKa7HgrEaB4z","AHBcZdsmHCWDgtpC7","DH5JdmwxHqaXbBvEA","SkaZcE3z5iJeCHkaJ","TfED66CoJYGCLZYuT","TjDPaZbFguW9SL9i4","YMq7twBerkTLPzjFA","ZuF937trtie4BQLu7","azQ52wqDwKz7CXhcT","exDrBuNqQrwcXC3at","f7jaSovysnJBH42jJ","khBkuJmWPrzrmvsuq"],"author_short":["Jafarian, J. H.","Abbasi, A.","Sheikhabadi, S. S."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Jafar","Haadi"],"propositions":[],"lastnames":["Jafarian"],"suffixes":[]},{"firstnames":["Ali"],"propositions":[],"lastnames":["Abbasi"],"suffixes":[]},{"firstnames":["Siavash","Safaei"],"propositions":[],"lastnames":["Sheikhabadi"],"suffixes":[]}],"editor":[{"firstnames":["Vidyasagar","M."],"propositions":[],"lastnames":["Potdar"],"suffixes":[]}],"title":"A gray-box DPDA-based intrusion detection technique using system-call monitoring","booktitle":"The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS 2011, Perth, Australia, September 1-2, 2011, Proceedings","pages":"1–12","publisher":"ACM","year":"2011","url":"https://doi.org/10.1145/2030376.2030377","doi":"10.1145/2030376.2030377","timestamp":"Fri, 28 Oct 2022 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/ceas/JafarianAS11.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/ceas/JafarianAS11,\n author = {Jafar Haadi Jafarian and\n Ali Abbasi and\n Siavash Safaei Sheikhabadi},\n editor = {Vidyasagar M. Potdar},\n title = {A gray-box DPDA-based intrusion detection technique using system-call\n monitoring},\n booktitle = {The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and\n Spam Conference, {CEAS} 2011, Perth, Australia, September 1-2, 2011,\n Proceedings},\n pages = {1--12},\n publisher = {{ACM}},\n year = {2011},\n url = {https://doi.org/10.1145/2030376.2030377},\n doi = {10.1145/2030376.2030377},\n timestamp = {Fri, 28 Oct 2022 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/ceas/JafarianAS11.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Jafarian, J. H.","Abbasi, A.","Sheikhabadi, S. S."],"editor_short":["Potdar, V. M."],"key":"DBLP:conf/ceas/JafarianAS11","id":"DBLP:conf/ceas/JafarianAS11","bibbaseid":"jafarian-abbasi-sheikhabadi-agrayboxdpdabasedintrusiondetectiontechniqueusingsystemcallmonitoring-2011","role":"author","urls":{"Paper":"https://doi.org/10.1145/2030376.2030377"},"metadata":{"authorlinks":{"abbasi, a":"https://homepage.ruhr-uni-bochum.de/ali.abbasi-i4q/pub.html"}},"downloads":0},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/73/2297-2.bib","creationDate":"2020-05-01T22:19:37.151Z","downloads":0,"keywords":[],"search_terms":["gray","box","dpda","based","intrusion","detection","technique","using","system","call","monitoring","jafarian","abbasi","sheikhabadi"],"title":"A gray-box DPDA-based intrusion detection technique using system-call monitoring","year":2011,"dataSources":["mgBXxEwpGG6TrJ3nr","9RRnqWppvSHbtx7rD","7whi7meiPSmyTF8Y3","eqGZWjgQsJSxuxEGv"]}