Applied parallel coordinates for logs and network traffic attack analysis Sebastien TricaudPhilippe Saadé Original Paper 27 August 2009 Pages: 1 - 29
Analysis of a scanning model of worm propagation Ezzat KirmaniCynthia S. Hood Original Paper 24 December 2008 Pages: 31 - 42
New data mining technique to enhance IDS alarms quality Safaa O. Al-MamoryHongli Zhang Original Paper 10 September 2008 Pages: 43 - 55
Advanced fuzzing in the VoIP space Humberto AbdelnurRadu StateOlivier Festor Original Paper 21 June 2009 Pages: 57 - 64
Simulating malware with MAlSim Rafał LeszczynaIgor Nai FovinoMarcelo Masera Eicar 2008 Extended Version 01 July 2008 Pages: 65 - 75
Comparative analysis of various ransomware virii Alexandre Gazet Eicar 2008 extended version 04 July 2008 Pages: 77 - 90