On Evaluation of Response Cost for Intrusion Response Systems (Extended Abstract)
Natalia Stakhanova (University of New Brunswick, Canada); Chris Strasburg (Iowa State University, US); Samik Basu (Iowa State University, US); Johnny S. Wong (Iowa State University, US)

WebIDS: a Cooperative Bayesian Anomaly-Based Intrusion Detection System for Web Applications (Extended Abstract)
Nathalie Dagorn (LACS, University of Luxembourg, FR)

Best PosterEvading Anomaly Detection through Variance Injection Attacks on PCA (Extended Abstract)Benjamin Rubinstein (University of California, Berkeley, US); Blaine Nelson (University of California, Berkeley, US); Ling Huang (University of California, Berkeley, US); Anthony D. Joseph (University of California, Berkeley, US); Shing-hon Lau (University of California, Berkeley, US); Nina Taft (Intel Research, US); Doug Tygar(University of California, Berkeley, US)

Anticipating Hidden Text Salting in Emails (Extended Abstract)
Christina Lioma (Katholieke Universiteit Leuven, BE); Marie- Francine Moens (Katholieke Universiteit Leuven, BE); Juan Gomez-Carranza (Katholieke Universiteit Leuven, BE); Jan De Beer (Katholieke Universiteit Leuven, BE); Andre Bergholz (Fraunhofer IAIS, DE); Gerhard Paass (Fraunhofer IAIS, DE); Patrick Horkan (Symantec, IE)

Improving Anomaly Detection Error Rate by Collective Trust Modeling (Extended Abstract)
Martin Rehak (Czech Technical University in Prague, CZ); Michal Pechoucek (Czech Technical University in Prague, CZ); Karel Bartos (CESNET, CZ); Martin Gril l (CESNET, CZ); Pavel Celeda (Masaryk University, CZ); Vojtech Krmicek (Masaryk University, CZ)

Database Intrusion Detection and Response (Extended Abstract)
Ashish Kamra (Purdue University, US); Elisa Bertino (Purdue University, US)

An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract)
Deanna Caputo (The MITRE Corporation, US); Gregory Stephens (The MITRE Corporation, US); Brad Stephenson (The MITRE Corporation, US)

Page-based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract)
Junsup Lee (Korea Advanced Institute of Science and Technology (KAIST), KR); Sungdeok Cha (Korea University, KR)

Automating the Analysis of Honeypot Data (Extended Abstract)
Olivier Thonnard (Royal Military Academy, BE); Jouni Viinikka (France Telecom, FR); Corrado Leita (Institut EURECOM, FR); Marc Dacier (Institut Eurecom, FR)

Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response (Extended Abstract)
Paul Rubel (BBN Technologies, US); Partha Pal (BBN Technologies, US); Michael Atighetchi (BBN Technologies, US); Paul Benjamin (Pace University, US); Franklin Webber (BBN Technologies, US)

Monitoring the Execution of Third-party Software on Mobile Devices (Extended Abstract)
Andrew Brown (University of Birmingham, UK)

Streaming Estimation of Information-theoretic Metrics for Anomaly Detection (Extended Abstract)
Sergey Bratus (Dartmouth Col lege, US); Joshua Brody (Dartmouth Col lege, US); David Kotz (Dartmouth Col lege, US); Anna Shubina (Dartmouth College, US)

Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract)
Wei Lu (University of New Brunswick, University of Victoria, CA)

Anomalous Taint Detection (Extended Abstract)
Lorenzo Caval laro (University of California, Santa Barbara, US); R. Sekar (SUNY-Stony Brook, US)

Deep Packet Inspection Using Message Passing Networks (Extended Abstract)
Divya Jain (Indian Institute of Science, IN); Vasanta Lakshmi Kommineni (Indian Institute of Science, IN); Priti Shankar (Indian Institute of Science, IN)

System Call API Obfuscation (Extended Abstract)
Abhinav Srivastava (Georgia Institute of Technology, US); Andrea Lanzi (University of Milan, IT); Jonathon Giffin (Georgia Institute of Technology, US)