|
Search the dblp DataBase
John G. Levine:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Julian B. Grizzard, John G. Levine, Henry L. Owen
Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table. [Citation Graph (0, 0)][DBLP] ESORICS, 2004, pp:369-384 [Conf]
- John G. Levine, Richard LaBella, Henry L. Owen, Didier Contis, Brian Culver
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks. [Citation Graph (0, 0)][DBLP] IAW, 2003, pp:92-99 [Conf]
- Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. Owen
Wireless Intrusion Detection and Response. [Citation Graph (0, 0)][DBLP] IAW, 2003, pp:68-75 [Conf]
- Nicholas Athanasiades, Randal Abler, John G. Levine, Henry L. Owen, George F. Riley
Intrusion Detection Testing and Benchmarking Methodologies. [Citation Graph (0, 0)][DBLP] IWIA, 2003, pp:63-72 [Conf]
- John G. Levine, Julian B. Grizzard, Henry L. Owen
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. [Citation Graph (0, 0)][DBLP] IWIA, 2004, pp:107-128 [Conf]
- David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen
HoneyStat: Local Worm Detection Using Honeypots. [Citation Graph (0, 0)][DBLP] RAID, 2004, pp:39-58 [Conf]
- John G. Levine, Julian B. Grizzard, Henry L. Owen
Using Honeynets to Protect Large Enterprise Networks. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:6, pp:73-75 [Journal]
- John G. Levine, Julian B. Grizzard, Henry L. Owen
Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2006, v:4, n:1, pp:24-32 [Journal]
Search in 0.001secs, Finished in 0.002secs
|