The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Guofei Gu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough
    DSO: Dependable Signing Overlay. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:33-49 [Conf]
  2. Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang
    PLI: A New Framework to Protect Digital Content for P2P Networks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:206-216 [Conf]
  3. Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley
    Worm Detection, Early Warning and Response Based on Local Victim Information. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:136-145 [Conf]
  4. Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
    Measuring intrusion detection capability: an information-theoretic approach. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:90-101 [Conf]
  5. Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
    Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:527-546 [Conf]
  6. Weidong Shi, Hsien-Hsin S. Lee, Guofei Gu, Laura Falk, Trevor N. Mudge, Mrinmoy Ghosh
    An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor. [Citation Graph (0, 0)][DBLP]
    ICAC, 2005, pp:263-273 [Conf]
  7. Roberto Perdisci, Guofei Gu, Wenke Lee
    Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems. [Citation Graph (0, 0)][DBLP]
    ICDM, 2006, pp:488-498 [Conf]
  8. David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen
    HoneyStat: Local Worm Detection Using Honeypots. [Citation Graph (0, 0)][DBLP]
    RAID, 2004, pp:39-58 [Conf]

  9. A Taxonomy of Botnet Structures. [Citation Graph (, )][DBLP]


  10. Active Botnet Probing to Identify Obscure Command and Control Channels. [Citation Graph (, )][DBLP]


  11. Principled reasoning and practical applications of alert fusion in intrusion detection systems. [Citation Graph (, )][DBLP]


  12. InfoShield: a security architecture for protecting information usage in memory. [Citation Graph (, )][DBLP]


  13. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. [Citation Graph (, )][DBLP]


  14. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. [Citation Graph (, )][DBLP]


  15. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002