Information Technology Reference
In-Depth Information
9. Kraxberger, S., Payer, U.: Markov Model for Polymorphic Shellcode Detection.
accepted at INC 2005. (2005)
10. Mathworks. Neural network toolbox.
http://www.mathworks.com/products/neuralnet/ (2004)
11. NASM SourceForge Project. http://nasm.sourceforge.net (2005)
12. Pasupulati, A. Coit, Levitt, J., Wu, K., Li, S.F., Kuo, S.H., Fan, J.C.: Buttercup:
on network-based detection of polymorphic buffer overflow vulnerabilities. Network
Operations and Management Symposium, 2004. NOMS 2004. IEEE/IFIP, Vol. 1
(2004) 235-248
13. Payer, U., Teufl, P., Lamberger, M.: Hybrid Engine for Polymorphic Shellcode
Detection. accepted at DIMVA (2005)
14.Payer,U.,Teufl,P.,Lamberger,M.: Tra c classification using Self-Organizing
Maps. accepted at INC 2005 (2005)
15. Roweis, S.: Levenberg-marquardt optimization.
http://www.cs.toronto.edu/˜roweis/notes/lm.pdf (2005)
16. Ruiu, D.: Snort preprocessor - Multi-architecture mutated NOP sled detector.
http://cansecwest.com/spp fnord.c (2005)
17. Sedalo, M.: Polymorphic Shellcode Engine. http://www.shellcode.com.ar (2004)
18. Snort. Open Source Network Intrusion Detection System. http://www.snort.org
(2005)
19. Toth, T., Kruegel, Ch.: Accurate buffer overflow detection via abstract payload
execution. RAID 2002, Lecture Notes in Computer Science, Vol. 2516 (2002) 274-
291
20. Weisstein, E.W.: Markov Chain. From MathWorld-A Wolfram Web Resource.
http://mathworld.wolfram.com/MarkovChain.html
Search WWH ::




Custom Search