The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael Bailey: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael Bailey, Evan Cooke, Farnam Jahanian, Niels Provos, Karl Rosaen, David Watson
    Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic. [Citation Graph (0, 0)][DBLP]
    Internet Measurment Conference, 2005, pp:239-252 [Conf]
  2. Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario
    The Internet Motion Sensor - A Distributed Blackhole Monitoring System. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  3. Charles Higby, Michael Bailey
    Wireless security patch management system. [Citation Graph (0, 0)][DBLP]
    SIGITE Conference, 2004, pp:165-168 [Conf]
  4. Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, David Watson, Farnam Jahanian, Danny McPherson
    Toward understanding distributed blackhole placement. [Citation Graph (0, 0)][DBLP]
    WORM, 2004, pp:54-64 [Conf]
  5. Michael Bailey, Evan Cooke, Farnam Jahanian, David Watson, Jose Nazario
    The Blaster Worm: Then and Now. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:26-31 [Journal]
  6. Evan Cooke, Michael Bailey, Farnam Jahanian, Richard Mortier
    The Dark Oracle: Perspective-Aware Unused and Unreachable Address Discovery. [Citation Graph (0, 0)][DBLP]
    NSDI, 2006, pp:- [Conf]
  7. Michael Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario
    Automated Classification and Analysis of Internet Malware. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:178-197 [Conf]

  8. Operating System Power Dependencies. [Citation Graph (, )][DBLP]


  9. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. [Citation Graph (, )][DBLP]


  10. A Framework for Understanding and Applying Ethical Principles in Network and Security Research. [Citation Graph (, )][DBLP]


  11. Shedding Light on the Configuration of Dark Addresses. [Citation Graph (, )][DBLP]


  12. CANVuS: Context-Aware Network Vulnerability Scanning. [Citation Graph (, )][DBLP]


  13. Verification, validation, and accreditation (VV&A): one voice --- unified, common & cross-cutting. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002