The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

David Dagon: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley
    Worm Detection, Early Warning and Response Based on Local Victim Information. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:136-145 [Conf]
  2. Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
    Measuring intrusion detection capability: an information-theoretic approach. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:90-101 [Conf]
  3. Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee
    Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2006, pp:91-108 [Conf]
  4. Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
    Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:527-546 [Conf]
  5. David Dagon, Wenke Lee, Richard J. Lipton
    Protecting Secret Data from Insider Attacks. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:16-30 [Conf]
  6. David Dagon, Cliff Zou, Wenke Lee
    Modeling Botnet Propagation Using Time Zones. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  7. David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen
    HoneyStat: Local Worm Detection Using Honeypots. [Citation Graph (0, 0)][DBLP]
    RAID, 2004, pp:39-58 [Conf]
  8. Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller
    Environment-Sensitive Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:185-206 [Conf]
  9. Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul I. Sharif
    MisleadingWorm Signature Generators Using Deliberate Noise Injection. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:17-31 [Conf]
  10. Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee
    PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:289-300 [Conf]

  11. A Taxonomy of Botnet Structures. [Citation Graph (, )][DBLP]


  12. Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces. [Citation Graph (, )][DBLP]


  13. Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries. [Citation Graph (, )][DBLP]


  14. Towards complete node enumeration in a peer-to-peer botnet. [Citation Graph (, )][DBLP]


  15. Can DNS-Based Blacklists Keep Up with Bots? [Citation Graph (, )][DBLP]


  16. Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. [Citation Graph (, )][DBLP]


  17. Recursive DNS Architectures and Vulnerability Implications. [Citation Graph (, )][DBLP]


  18. A Centralized Monitoring Infrastructure for Improving DNS Security. [Citation Graph (, )][DBLP]


Search in 0.017secs, Finished in 0.018secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002