The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Thomas E. Daniels: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Florian P. Buchholz, Thomas E. Daniels, James P. Early, Rajeev Gopalakrishna, R. Patrick Gorman, Benjamin A. Kuperman, Sofie Nystrom, Addam Schroll, Andrew Smith
    Digging For Worms, Fishing For Answers. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:219-228 [Conf]
  2. Thomas E. Daniels, Eugene H. Spafford
    A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:178-187 [Conf]
  3. Wei Wang, Thomas E. Daniels
    Building Evidence Graphs for Network Forensics Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:254-266 [Conf]
  4. Wei Wang, Thomas E. Daniels
    Network Forensics Analysis with Evidence Graphs. [Citation Graph (0, 0)][DBLP]
    DFRWS, 2005, pp:- [Conf]
  5. Yongping Tang, Thomas E. Daniels
    A Simple Framework for Distributed Forensics. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:163-169 [Conf]
  6. Thomas E. Daniels
    A functional reference model of passive systems for tracing network traffic. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2004, v:1, n:1, pp:69-81 [Journal]
  7. Thomas E. Daniels, Eugene H. Spafford
    Identification of Host Audit Data to Detect Attacks on Low-level IP Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1999, v:7, n:1, pp:3-35 [Journal]
  8. Wei Wang, Thomas E. Daniels
    Diffusion and graph spectral methods for network forensic analysis. [Citation Graph (0, 0)][DBLP]
    NSPW, 2006, pp:99-106 [Conf]

  9. Reference models for network data anonymization. [Citation Graph (, )][DBLP]


  10. P2P botnet detection using behavior clustering & statistical tests. [Citation Graph (, )][DBLP]


  11. SCWIM an Integrity Model for SOA Networks. [Citation Graph (, )][DBLP]


  12. Monitor placement for stepping stone analysis. [Citation Graph (, )][DBLP]


  13. Xen worlds: leveraging virtualization in distance education. [Citation Graph (, )][DBLP]


  14. Correlation Based Node Behavior Profiling for Enterprise Network Security. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002