The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Monirul I. Sharif: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley
    Worm Detection, Early Warning and Response Based on Local Victim Information. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:136-145 [Conf]
  2. George F. Riley, Monirul I. Sharif, Wenke Lee
    Simulating Internet Worms. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2004, pp:268-274 [Conf]
  3. Monirul I. Sharif, George F. Riley, Wenke Lee
    Comparative Study between Analytical Models and Packet-Level Worm Simulations. [Citation Graph (0, 0)][DBLP]
    PADS, 2005, pp:88-98 [Conf]
  4. Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul I. Sharif
    MisleadingWorm Signature Generators Using Deliberate Noise Injection. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:17-31 [Conf]
  5. Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee
    Understanding Precision in Host Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:21-41 [Conf]

  6. Ether: malware analysis via hardware virtualization extensions. [Citation Graph (, )][DBLP]


  7. Secure in-VM monitoring using hardware virtualization. [Citation Graph (, )][DBLP]


  8. Eureka: A Framework for Enabling Static Malware Analysis. [Citation Graph (, )][DBLP]


  9. Impeding Malware Analysis Using Conditional Code Obfuscation. [Citation Graph (, )][DBLP]


  10. K-Tracer: A System for Extracting Kernel Malware Behavior. [Citation Graph (, )][DBLP]


  11. Automatic Reverse Engineering of Malware Emulators. [Citation Graph (, )][DBLP]


  12. Lares: An Architecture for Secure Active Monitoring Using Virtualization. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002