Accepted Papers

  • A Framework For The Application Of Association Rule Mining In Large Intrusion Detection Infrastructures
    • James J. Treinen, Ramakrishna Thurimella
  • Allergy Attack Against Automatic Signature Generation
    • Simon P. Chung and Aloysius K. Mok
  • ANAGRAM: A Content Anomaly Detector Resistant To Mimicry Attack
    • Ke Wang, Janak J. Parekh, Salvatore J. Stolfo
  • Anomaly Detector Performance Evaluation Using A Parameterized Environment
    • Jeffery P. Hansen, Roy A. Maxion and Kymie M.C. Tan
  • Automated Discovery Of Mimicry Attacks
    • Jonathon T. Giffin, Somesh Jha, and Barton P. Miller
  • Automatic Handling Of Protocol Dependencies And Reaction To 0-Day Attacks With ScriptGen Based Honeypots
    • Corrado Leita, Marc Dacier, Frederic Massicotte
  • Behavioral Distance Measurement Using Hidden Markov Models
    • Debin Gao and Michael K. Reiter and Dawn Song
  • DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model For MANET
    • Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl Levitt
  • Enchancing Network Intrusion Detection With Integrated Sampling And Filtering
    • Jose M. Gonzalez and Vern Paxson
  • Fast And Evasive Attacks: Highlighting The Challenges Ahead
    • Moheeb Abu Rajab and Fabian Monrose and Andreas Terzis
  • Paragraph: Thwarting Signature Learning By Training Maliciously
    • James Newsome, Brad Karp, Dawn Song
  • Ranking Attack Graphs
    • Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu, Edmund Clarke, Jeannette Wing
  • Safecard: A Gigabit IPS On The Network Card
    • Willem de Bruijn, Asia Slowinska, Kees van Reeuwijk, Tomas Hruby, Li Xu, Herbert Bos
  • The Nepenthes Platform: An Efficient Approach To Collect Malware
    • Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix Freiling
  • Using Hidden Markov Models To Evaluate The Risks Of Intrusions - System Architecture And Model Validation
    • André Årnes, Fredrik Valeur, Giovanni Vigna, and Richard A. Kemmerer
  • WIND: Workload-Aware Intrusion Detection
    • Sushant Sinha, Farnam Jahanian, and Jignesh M. Patel

Important Dates

Download the RAID 2006 list of events as iCal-format file ready to include into your iCal or Sunbird calendar:

Head over to the Important Dates page for details:

Important Dates »


RAID 2006 will be directly preceded by ESORICS 2006.

ESORICS 2006 homepage