Search the dblp DataBase
Thomas E. Daniels :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Florian P. Buchholz , Thomas E. Daniels , James P. Early , Rajeev Gopalakrishna , R. Patrick Gorman , Benjamin A. Kuperman , Sofie Nystrom , Addam Schroll , Andrew Smith Digging For Worms, Fishing For Answers. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:219-228 [Conf ] Thomas E. Daniels , Eugene H. Spafford A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:178-187 [Conf ] Wei Wang , Thomas E. Daniels Building Evidence Graphs for Network Forensics Analysis. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:254-266 [Conf ] Wei Wang , Thomas E. Daniels Network Forensics Analysis with Evidence Graphs. [Citation Graph (0, 0)][DBLP ] DFRWS, 2005, pp:- [Conf ] Yongping Tang , Thomas E. Daniels A Simple Framework for Distributed Forensics. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:163-169 [Conf ] Thomas E. Daniels A functional reference model of passive systems for tracing network traffic. [Citation Graph (0, 0)][DBLP ] Digital Investigation, 2004, v:1, n:1, pp:69-81 [Journal ] Thomas E. Daniels , Eugene H. Spafford Identification of Host Audit Data to Detect Attacks on Low-level IP Vulnerabilities. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1999, v:7, n:1, pp:3-35 [Journal ] Wei Wang , Thomas E. Daniels Diffusion and graph spectral methods for network forensic analysis. [Citation Graph (0, 0)][DBLP ] NSPW, 2006, pp:99-106 [Conf ] Reference models for network data anonymization. [Citation Graph (, )][DBLP ] P2P botnet detection using behavior clustering & statistical tests. [Citation Graph (, )][DBLP ] SCWIM an Integrity Model for SOA Networks. [Citation Graph (, )][DBLP ] Monitor placement for stepping stone analysis. [Citation Graph (, )][DBLP ] Xen worlds: leveraging virtualization in distance education. [Citation Graph (, )][DBLP ] Correlation Based Node Behavior Profiling for Enterprise Network Security. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.003secs