The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Cliff Changchun Zou: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou
    Improving software security via runtime instruction-level taint checking. [Citation Graph (0, 0)][DBLP]
    ASID, 2006, pp:18-24 [Conf]
  2. Cliff Changchun Zou, Lixin Gao, Weibo Gong, Donald F. Towsley
    Monitoring and early warning for internet worms. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:190-199 [Conf]
  3. Cliff Changchun Zou, Weibo Gong, Donald F. Towsley
    Code red worm propagation modeling and analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:138-147 [Conf]
  4. Cliff Changchun Zou, Ryan Cunningham
    Honeypot-Aware Advanced Botnet Construction and Maintenance. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:199-208 [Conf]
  5. Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
    Email Worms Modeling and Defense. [Citation Graph (0, 0)][DBLP]
    ICCCN, 2004, pp:409-414 [Conf]
  6. David Dagon, Cliff Zou, Wenke Lee
    Modeling Botnet Propagation Using Time Zones. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  7. Cliff Changchun Zou, Donald F. Towsley, Weibo Gong, Songlin Cai
    Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information. [Citation Graph (0, 0)][DBLP]
    PADS, 2005, pp:199-206 [Conf]
  8. Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
    On the performance of Internet worm scanning strategies. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2006, v:63, n:7, pp:700-723 [Journal]
  9. Cliff Changchun Zou, Weibo Gong, Donald F. Towsley, Lixin Gao
    The monitoring and early detection of internet worms. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2005, v:13, n:5, pp:961-974 [Journal]
  10. Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
    Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:2, pp:105-118 [Journal]

  11. Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting. [Citation Graph (, )][DBLP]


  12. A chipset level network backdoor: bypassing host-based firewall & IDS. [Citation Graph (, )][DBLP]


  13. Scene tagging: image-based CAPTCHA using image composition and object relationships. [Citation Graph (, )][DBLP]


  14. Worm propagation modeling and analysis under dynamic quarantine defense. [Citation Graph (, )][DBLP]


Search in 0.019secs, Finished in 0.019secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002