|
Search the dblp DataBase
David Dagon:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley
Worm Detection, Early Warning and Response Based on Local Victim Information. [Citation Graph (0, 0)][DBLP] ACSAC, 2004, pp:136-145 [Conf]
- Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
Measuring intrusion detection capability: an information-theoretic approach. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:90-101 [Conf]
- Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. [Citation Graph (0, 0)][DBLP] DIMVA, 2006, pp:91-108 [Conf]
- Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] ESORICS, 2006, pp:527-546 [Conf]
- David Dagon, Wenke Lee, Richard J. Lipton
Protecting Secret Data from Insider Attacks. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:16-30 [Conf]
- David Dagon, Cliff Zou, Wenke Lee
Modeling Botnet Propagation Using Time Zones. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen
HoneyStat: Local Worm Detection Using Honeypots. [Citation Graph (0, 0)][DBLP] RAID, 2004, pp:39-58 [Conf]
- Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller
Environment-Sensitive Intrusion Detection. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:185-206 [Conf]
- Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul I. Sharif
MisleadingWorm Signature Generators Using Deliberate Noise Injection. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:17-31 [Conf]
- Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. [Citation Graph (0, 0)][DBLP] ACSAC, 2006, pp:289-300 [Conf]
A Taxonomy of Botnet Structures. [Citation Graph (, )][DBLP]
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces. [Citation Graph (, )][DBLP]
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries. [Citation Graph (, )][DBLP]
Towards complete node enumeration in a peer-to-peer botnet. [Citation Graph (, )][DBLP]
Can DNS-Based Blacklists Keep Up with Bots? [Citation Graph (, )][DBLP]
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. [Citation Graph (, )][DBLP]
Recursive DNS Architectures and Vulnerability Implications. [Citation Graph (, )][DBLP]
A Centralized Monitoring Infrastructure for Improving DNS Security. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|