The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Niels Provos: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael Bailey, Evan Cooke, Farnam Jahanian, Niels Provos, Karl Rosaen, David Watson
    Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic. [Citation Graph (0, 0)][DBLP]
    Internet Measurment Conference, 2005, pp:239-252 [Conf]
  2. Niels Provos, Peter Honeyman
    ScanSSH: Scanning the Internet for SSH Servers. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:25-30 [Conf]
  3. Niels Provos, Peter Honeyman
    Detecting Steganographic Content on the Internet. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  4. Niels Provos, Chuck Lever
    Scalable Network I/O in Linux. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2000, pp:109-120 [Conf]
  5. Niels Provos, David Mazières
    A Future-Adaptable Password Scheme. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 1999, pp:81-91 [Conf]
  6. Theo de Raadt, Niklas Hallqvist, Artur Grabowski, Angelos D. Keromytis, Niels Provos
    Cryptography in OpenBSD: An Overview. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 1999, pp:93-101 [Conf]
  7. Niels Provos
    A Virtual Honeypot Framework. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:1-14 [Conf]
  8. Niels Provos, Joe McClain, Ke Wang
    Search worms. [Citation Graph (0, 0)][DBLP]
    WORM, 2006, pp:1-8 [Conf]
  9. Niels Provos, Peter Honeyman
    Hide and Seek: An Introduction to Steganography. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:32-44 [Journal]

  10. Peeking Through the Cloud: DNS-Based Estimation and Its Applications. [Citation Graph (, )][DBLP]


  11. Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS Flooding Attacks. [Citation Graph (, )][DBLP]


  12. Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. [Citation Graph (, )][DBLP]


  13. Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware. [Citation Graph (, )][DBLP]


  14. To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads. [Citation Graph (, )][DBLP]


  15. All Your iFRAMEs Point to Us. [Citation Graph (, )][DBLP]


  16. Cybercrime 2.0: when the cloud turns dark. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002