|
Search the dblp DataBase
Niels Provos:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Michael Bailey, Evan Cooke, Farnam Jahanian, Niels Provos, Karl Rosaen, David Watson
Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic. [Citation Graph (0, 0)][DBLP] Internet Measurment Conference, 2005, pp:239-252 [Conf]
- Niels Provos, Peter Honeyman
ScanSSH: Scanning the Internet for SSH Servers. [Citation Graph (0, 0)][DBLP] LISA, 2001, pp:25-30 [Conf]
- Niels Provos, Peter Honeyman
Detecting Steganographic Content on the Internet. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Niels Provos, Chuck Lever
Scalable Network I/O in Linux. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, FREENIX Track, 2000, pp:109-120 [Conf]
- Niels Provos, David Mazières
A Future-Adaptable Password Scheme. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, FREENIX Track, 1999, pp:81-91 [Conf]
- Theo de Raadt, Niklas Hallqvist, Artur Grabowski, Angelos D. Keromytis, Niels Provos
Cryptography in OpenBSD: An Overview. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, FREENIX Track, 1999, pp:93-101 [Conf]
- Niels Provos
A Virtual Honeypot Framework. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2004, pp:1-14 [Conf]
- Niels Provos, Joe McClain, Ke Wang
Search worms. [Citation Graph (0, 0)][DBLP] WORM, 2006, pp:1-8 [Conf]
- Niels Provos, Peter Honeyman
Hide and Seek: An Introduction to Steganography. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2003, v:1, n:3, pp:32-44 [Journal]
Peeking Through the Cloud: DNS-Based Estimation and Its Applications. [Citation Graph (, )][DBLP]
Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS Flooding Attacks. [Citation Graph (, )][DBLP]
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. [Citation Graph (, )][DBLP]
Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware. [Citation Graph (, )][DBLP]
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads. [Citation Graph (, )][DBLP]
All Your iFRAMEs Point to Us. [Citation Graph (, )][DBLP]
Cybercrime 2.0: when the cloud turns dark. [Citation Graph (, )][DBLP]
Search in 0.031secs, Finished in 0.031secs
|