Intrusion Detection

Title Speakers Conference Tags
Hybrid defense: How to protect yourself from polymorphic 0-days Dennis Gamayunov , Svetlana Gaivoronski BlackHat EU-2013 - Amsterdam, Netherlands Intrusion Detection Defence
2010 Data Breach Investigation Report Kenny Lee OWASP China-2010 - China Security Intrusion Detection Incident Response Computer Forensics
Data Loss Prevention Stephen Kreusch ZaCon-2 - Johannesburg, South Africa Security Others Intrusion Detection
The Security Innovation Network - Cluster Of Clusters Ls Ec BruCON-2010 - Brussels, Belgium Security Intrusion Detection Incident Response
Creating A Cert At Warp Speed Brian Honan BruCON-2010 - Brussels, Belgium Security Intrusion Detection Incident Response
Cyber [Crime|War] - Connecting The Dots Ian Amit BruCON-2010 - Brussels, Belgium Security Deep Knowledge Intrusion Detection Incident Response Privacy
The Strategy And Action Plan For Information Assurance And Cyber Security In Sweden Per Oscarson CyberSec -2010 - Brussels, Belgium Security Web Intrusion Detection Risk Intrusion Prevention Cyberwar
Connecting The Prime Minister To Routers Hillar Aarelaid CyberSec -2010 - Brussels, Belgium Security Computer Forensics Routing Intrusion Detection Incident Response Forensics
Resilience And Contingency Planning Peter Sommer CyberSec -2010 - Brussels, Belgium Security Computer Forensics Intrusion Detection Incident Response Cyberwar
Counter Intelligence As Defense: Integrating Predictive And Proactive Attack Knowledge As A Wall Of Defense Fred Donovan OWASP Dublin-2010 - Ireland Security Intrusion Detection Incident Response
Combatting client-side attacks using near-realtime detection Alex Kirk SEC-T-2010 - Stockholm, Sweden Security Intrusion Detection
Collaborative Intrusion Detection Framework: Characteristics, Adversarial Opportunities And Countermeasures Sahin Albayrak , Seyit Ahmet Camtepe , Rainer Bye CollSec-2010 - Washington DC, USA Security Infrastructure Intrusion Detection Incident Response Intrusion Prevention
Defending Against Application Level Dos Attacks Roberto Suggi Liverani OWASP New Zealand-2010 - New Zealand Security Intrusion Detection Application Security
Detecting And Protecting Your Users From 100% Of All Malware - How? Vadim Pogulievsky , Bradley Anstis OWASP Appsec-2010 - Stocholm, Sweden Security Intrusion Detection Incident Response Malware
Cyber Security From Article 4 And 5 Perspective Ulf Häussler CCDCOE-2010 - Estonia Security Intrusion Detection Incident Response Legal
Situation Management In Cyber Conflicts Gabriel Jakobson CCDCOE-2010 - Estonia Security Intrusion Detection Incident Response Cyberwar
Cyber Deterrence And International Institutions Ryan Kaminski CCDCOE-2010 - Estonia Security Intrusion Detection Incident Response Intrusion Prevention
Cyber Attacks And The Resilience Of Internet Infrastructure Rytis Rainys CCDCOE-2010 - Estonia Security Infrastructure Intrusion Detection Incident Response Cyberwar
Personal Identity Verification Interoperability (Piv-I) Sal D'agostino Security B-Sides Boston-2010 - Boston, USA Access Control Access Intrusion Detection
We’Ve Been Hacked! What Went Wrong And Why Mark Goudie Ruxcon-2010 - Melbourne, Austrailia Security Intrusion Detection Incident Response
Community-Oriented Computer Security Incident Response Teams (C-Csirts) David Ellefsen ZaCon-1 - Johannesburg, South Africa Security Intrusion Detection Incident Response Community
Improving Application Security After An Incident Cory Scott OWASP Appsec-2009 - Washington DC, USA Security Intrusion Detection Incident Response
Polymorphic Attacks: Evasion Techniques And Detection Approaches Michalis Polychronakis EC2ND-2008 - Heraklion, Greece Security Intrusion Detection Incident Response Computer Forensics
An Architecture For Inline Anomaly Detection Tammo Krueger , Christiam Gehl , Konrad Rieck , Pavel Laskov EC2ND-2008 - Heraklion, Greece Security Intrusion Detection
Kids - Kernel Intrusion Detection System Rodrigo Rubira Branco TROOPERS-2008 - Munich, German Intrusion Detection
Defending Against Next Generation Attacks Through Network/Endpoint Collaboration And Interaction Spiros Antonatos , Michael E. Locasto , Stelios Sidiroglou , Angelos D. Keromytis , Evangelos P. Markatos EC2ND-2007 - Heraklion, Greece Intrusion Detection Incident Response Network Penetration
A Novel Approach For Anomaly Detection Over High-Speed Networks Osman Salem , Sandrine Vaton , Annie Gravey EC2ND-2007 - Heraklion, Greece Android Intrusion Detection Incident Response
Ids Gone Bad Brian Caswell ShmooCon-2005 - Washington DC, USA Intrusion Detection
Intrusion Prevention And Application Security: The Good, The Bad, And The Ugly Crispin Cowan ShmooCon-2005 - Washington DC, USA Intrusion Detection
Building Target-Based Ids: Snort On The Move Martin Roesch ShmooCon-2005 - Washington DC, USA Intrusion Detection
Distributed Intrusion Detection System Evasion Enrique Sanchez DEF CON-09 - Las Vegas, USA Security Intrusion Detection
Applying Information Warfare Theory To Generate A Higher Level Of Knowledge From Current Ids Daniel J. Burroughs DEF CON-09 - Las Vegas, USA Security Intrusion Detection
Advanced Evasion Of Ids Buffer Overflow Detection Jeru Chaos Communication Congress-17 - Berlin, Germany Security Intrusion Detection
Intrusion Detection Wietse Venema 9th USENIX Security Symposium-2000 - Denver, USA Security Intrusion Detection
Evading Network-Based Intrusion Detection Systems Robert Graham DEF CON-08 - Las Vegas, USA Security Intrusion Detection
Network Ids - Do Not Bend, Fold, Spindle Or Mutilate John S. Flowers DEF CON-08 - Las Vegas, USA Security Intrusion Detection
Putting Intrusion Detection Into Intrusion Detection Systems Jon David Blackhat USA-1999 - Las Vegas, USA Security Intrusion Detection