The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

William K. Robertson: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur
    Bayesian Event Classification for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:14-23 [Conf]
  2. Christopher Krügel, William K. Robertson, Giovanni Vigna
    Detecting Kernel-Level Rootkits Through Binary Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:91-100 [Conf]
  3. Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer
    A Stateful Intrusion Detection System for World-Wide Web Servers. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:34-45 [Conf]
  4. Giovanni Vigna, William K. Robertson, Davide Balzarotti
    Testing network-based intrusion detection signatures using mutant exploits. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:21-30 [Conf]
  5. Christopher Krügel, William K. Robertson
    Alert Verification Determining the Success of Intrusion Attempts. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:25-38 [Conf]
  6. William K. Robertson, Christopher Krügel, Darren Mutz, Fredrik Valeur
    Run-time Detection of Heap-based Overflows. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:51-60 [Conf]
  7. William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer
    Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  8. Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur
    Topology-Based Detection of Anomalous BGP Messages. [Citation Graph (0, 0)][DBLP]
    RAID, 2003, pp:17-35 [Conf]
  9. Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna
    Polymorphic Worm Detection Using Structural Information of Executables. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:207-226 [Conf]
  10. Christopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna
    Static Disassembly of Obfuscated Binaries. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:255-270 [Conf]
  11. Christopher Krügel, Giovanni Vigna, William K. Robertson
    A multi-model approach to the detection of web-based attacks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:5, pp:717-738 [Journal]
  12. Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer
    Exploiting Execution Context for the Detection of Anomalous System Calls. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:1-20 [Conf]

  13. Improving Signature Testing through Dynamic Data Flow Analysis. [Citation Graph (, )][DBLP]


  14. Are your votes really counted?: testing the security of real-world electronic voting systems. [Citation Graph (, )][DBLP]


  15. Protecting a Moving Target: Addressing Web Application Concept Drift. [Citation Graph (, )][DBLP]


Search in 0.017secs, Finished in 0.018secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002