The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Giovanni Vigna: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Darren Mutz, Giovanni Vigna, Richard A. Kemmerer
    An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:374-383 [Conf]
  2. Christopher Krügel, William K. Robertson, Giovanni Vigna
    Detecting Kernel-Level Rootkits Through Binary Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:91-100 [Conf]
  3. Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer
    An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:16-27 [Conf]
  4. Giovanni Vigna, Richard A. Kemmerer
    NetSTAT: A Network-Based Intrusion Detection Approach. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:25-0 [Conf]
  5. Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer
    A Stateful Intrusion Detection System for World-Wide Web Servers. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:34-45 [Conf]
  6. Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer
    Composable Tools For Network Discovery and Security Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:14-24 [Conf]
  7. Jingyu Zhou, Giovanni Vigna
    Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:168-178 [Conf]
  8. Christopher Krügel, Giovanni Vigna
    Anomaly detection of web-based attacks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:251-261 [Conf]
  9. Vishal Mittal, Giovanni Vigna
    Sensor-based intrusion detection for intra-domain distance-vector routing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:127-137 [Conf]
  10. Giovanni Vigna, William K. Robertson, Davide Balzarotti
    Testing network-based intrusion detection signatures using mutant exploits. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:21-30 [Conf]
  11. Fredrik Valeur, Darren Mutz, Giovanni Vigna
    A Learning-Based Approach to the Detection of SQL Attacks. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:123-140 [Conf]
  12. André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer
    Digital Forensic Reconstruction and the Virtual Security Testbed ViSe. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2006, pp:144-163 [Conf]
  13. Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee
    Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2006, pp:91-108 [Conf]
  14. Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna
    On the Detection of Anomalous System Call Arguments. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:326-343 [Conf]
  15. Giovanni Vigna
    A Topological Characterization of TCP/IP Security. [Citation Graph (0, 0)][DBLP]
    FME, 2003, pp:914-939 [Conf]
  16. Viktoria Felmetsger, Giovanni Vigna
    Exploiting OS-Level Mechanisms to Implement Mobile Code Security. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:234-243 [Conf]
  17. Oystein Hallaraker, Giovanni Vigna
    Detecting Malicious JavaScript Code in Mozilla. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2005, pp:85-94 [Conf]
  18. Giovanni Vigna, Andrew Mitchel
    Mnemosyne: Designing and Implementing Network Short-Term Memory. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2002, pp:91-100 [Conf]
  19. Antonio Carzaniga, Gian Pietro Picco, Giovanni Vigna
    Designing Distributed Applications with Mobile Code Paradigms. [Citation Graph (0, 0)][DBLP]
    ICSE, 1997, pp:22-32 [Conf]
  20. Richard A. Kemmerer, Giovanni Vigna
    Internet Security and Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICSE, 2003, pp:748-749 [Conf]
  21. Giovanni Vigna
    Teaching Network Security Through Live Exercises. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:3-18 [Conf]
  22. Antonio Carzaniga, Gian Pietro Picco, Giovanni Vigna
    Designing and Implementing Inter-Client Communication in the O2 Object-Oriented Database Management System. [Citation Graph (0, 0)][DBLP]
    ISOOMS, 1994, pp:53-64 [Conf]
  23. Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna
    Extending .NET Security to Unmanaged Code. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:1-16 [Conf]
  24. Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna
    SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:343-358 [Conf]
  25. Sebastian Fischmeister, Giovanni Vigna, Richard A. Kemmerer
    Evaluating the Security of Three Java-Based Mobile Agent Systems. [Citation Graph (0, 0)][DBLP]
    Mobile Agents, 2001, pp:31-41 [Conf]
  26. Carlo Ghezzi, Giovanni Vigna
    Mobile Code Paradigms and Technologies: A Case Study. [Citation Graph (0, 0)][DBLP]
    Mobile Agents, 1997, pp:39-49 [Conf]
  27. Giovanni Vigna, Bryan Cassell, Dave Fayram
    An Intrusion Detection System for Aglets. [Citation Graph (0, 0)][DBLP]
    Mobile Agents, 2002, pp:64-77 [Conf]
  28. Giovanni Vigna
    Cryptographic Traces for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:137-153 [Conf]
  29. Giovanni Vigna
    Mobile Agents: Ten Reasons For Failure. [Citation Graph (0, 0)][DBLP]
    Mobile Data Management, 2004, pp:298-299 [Conf]
  30. Gianpaolo Cugola, Carlo Ghezzi, Gian Pietro Picco, Giovanni Vigna
    Analyzing Mobile Code Languages. [Citation Graph (0, 0)][DBLP]
    Mobile Object Systems, 1996, pp:93-110 [Conf]
  31. William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer
    Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  32. André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer
    Using Hidden Markov Models to Evaluate the Risks of Intrusions. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:145-164 [Conf]
  33. Giovanni Vigna, Richard A. Kemmerer, Per Blix
    Designing a Web of Highly-Configurable Intrusion Detection Sensors. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:69-84 [Conf]
  34. Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna
    Polymorphic Worm Detection Using Structural Information of Executables. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:207-226 [Conf]
  35. Carlo Ghezzi, Giovanni Vigna
    Software Engineering Issues for Network Computing. [Citation Graph (0, 0)][DBLP]
    Requirements Targeting Software and Systems Engineering, 1997, pp:155-177 [Conf]
  36. Engin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic
    Noxes: a client-side solution for mitigating cross-site scripting attacks. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:330-337 [Conf]
  37. Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Engin Kirda
    An anomaly-driven reverse proxy for web applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:361-368 [Conf]
  38. Giovanni Vigna, Fredrik Valeur, Richard A. Kemmerer
    Designing and implementing a family of intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2003, pp:88-97 [Conf]
  39. Christopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer
    Stateful Intrusion Detection for High-Speed Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:285-0 [Conf]
  40. Christopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna
    Static Disassembly of Obfuscated Binaries. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:255-270 [Conf]
  41. Christopher Krügel, Giovanni Vigna, William K. Robertson
    A multi-model approach to the detection of web-based attacks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:5, pp:717-738 [Journal]
  42. Steve T. Eckmann, Giovanni Vigna, Richard A. Kemmerer
    STATL: An Attack Language for State-Based Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2002, v:10, n:1/2, pp:71-104 [Journal]
  43. Giovanni Vigna, Richard A. Kemmerer
    NetSTAT: A Network-based Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1999, v:7, n:1, pp:- [Journal]
  44. Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer
    A Comprehensive Approach to Intrusion Detection Alert Correlation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:3, pp:146-169 [Journal]
  45. Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel
    Anomalous system call detection. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:1, pp:61-93 [Journal]
  46. Alfonso Fuggetta, Gian Pietro Picco, Giovanni Vigna
    Understanding Code Mobility. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1998, v:24, n:5, pp:342-361 [Journal]
  47. Collin Mulliner, Giovanni Vigna
    Vulnerability Analysis of MMS User Agents. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:77-88 [Conf]
  48. Marco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna
    Static Detection of Vulnerabilities in x86 Executables. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:269-278 [Conf]
  49. Antonio Carzaniga, Gian Pietro Picco, Giovanni Vigna
    Is Code Still Moving Around? Looking Back at a Decade of Code Mobility. [Citation Graph (0, 0)][DBLP]
    ICSE Companion, 2007, pp:9-20 [Conf]
  50. Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna
    Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:63-86 [Conf]
  51. Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer
    Exploiting Execution Context for the Detection of Anomalous System Calls. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:1-20 [Conf]
  52. André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer
    Using a virtual security testbed for digital forensic reconstruction. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:2, n:4, pp:275-289 [Journal]

  53. Improving Signature Testing through Dynamic Data Flow Analysis. [Citation Graph (, )][DBLP]


  54. Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. [Citation Graph (, )][DBLP]


  55. Analyzing and Detecting Malicious Flash Advertisements. [Citation Graph (, )][DBLP]


  56. Multi-module vulnerability analysis of web-based applications. [Citation Graph (, )][DBLP]


  57. Your botnet is my botnet: analysis of a botnet takeover. [Citation Graph (, )][DBLP]


  58. Organizing Large Scale Hacking Competitions. [Citation Graph (, )][DBLP]


  59. Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners. [Citation Graph (, )][DBLP]


  60. A Parallel Architecture for Stateful, High-Speed Intrusion Detection. [Citation Graph (, )][DBLP]


  61. Are your votes really counted?: testing the security of real-world electronic voting systems. [Citation Graph (, )][DBLP]


  62. Automated Spyware Collection and Analysis. [Citation Graph (, )][DBLP]


  63. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. [Citation Graph (, )][DBLP]


  64. Protecting a Moving Target: Addressing Web Application Concept Drift. [Citation Graph (, )][DBLP]


  65. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. [Citation Graph (, )][DBLP]


  66. ClearShot: Eavesdropping on Keyboard Input from Video. [Citation Graph (, )][DBLP]


  67. There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. [Citation Graph (, )][DBLP]


  68. Detection and analysis of drive-by-download attacks and malicious JavaScript code. [Citation Graph (, )][DBLP]


  69. Client-side cross-site scripting protection. [Citation Graph (, )][DBLP]


Search in 0.364secs, Finished in 0.368secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002