Skip to main content
Book cover

Recent Advances in Intrusion Detection

12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009, Proceedings

  • Conference proceedings
  • © 2009

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5758)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: RAID 2009.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (33 papers)

  1. Recent Advances in Intrusion Detection Anomaly and Specification-Based Approaches

  2. Malware Detection and Prevention (I)

  3. Network and Host Intrusion Detection and Prevention

  4. Intrusion Detection for Mobile Devices

  5. High-Performance Intrusion Detection

  6. Malware Detection and Prevention (II)

  7. Posters

Other volumes

  1. Recent Advances in Intrusion Detection

Keywords

About this book

On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 12th International Symposium on Recent Advances in Intrusion Detection systems (RAID 2009),which took place in Saint-Malo,France, during September 23–25. As in the past, the symposium brought together leading - searchers and practitioners from academia, government, and industry to discuss intrusion detection research and practice. There were six main sessions prese- ingfullresearchpapersonanomalyandspeci?cation-basedapproaches,malware detection and prevention, network and host intrusion detection and prevention, intrusion detection for mobile devices, and high-performance intrusion det- tion. Furthermore, there was a poster session on emerging research areas and case studies. The RAID 2009ProgramCommittee received59 full paper submissionsfrom all over the world. All submissions were carefully reviewed by independent - viewers on the basis of space, topic, technical assessment, and overall balance. The ?nal selection took place at the Program Committee meeting on May 21 in Oakland, California. In all, 17 papers were selected for presentation and p- lication in the conference proceedings. As a continued feature, the symposium accepted submissions for poster presentations which have been published as - tended abstracts, reporting early-stage research, demonstration of applications, or case studies. Thirty posters were submitted for a numerical review by an independent, three-person sub-committee of the Program Committee based on novelty, description, and evaluation. The sub-committee recommended the - ceptance of 16 of these posters for presentation and publication. The success of RAID 2009 depended on the joint e?ort of many people.

Editors and Affiliations

  • Institute Eurecom, Sophia-Antipolis Cedex, France

    Engin Kirda, Davide Balzarotti

  • Computer Sciences Department, University of Wisconsin, Madison, USA

    Somesh Jha

Bibliographic Information

Publish with us