|
Search the dblp DataBase
James Newsome:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- James Newsome, David Brumley, Jason Franklin, Dawn Xiaodong Song
Replayer: automatic protocol replay by binary analysis. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:311-321 [Conf]
- James Newsome, Elaine Shi, Dawn Xiaodong Song, Adrian Perrig
The sybil attack in sensor networks: analysis & defenses. [Citation Graph (0, 0)][DBLP] IPSN, 2004, pp:259-268 [Conf]
- James Newsome, David Brumley, Dawn Xiaodong Song
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- James Newsome, Dawn Xiaodong Song
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software. [Citation Graph (0, 0)][DBLP] NDSS, 2005, pp:- [Conf]
- James Newsome, Brad Karp, Dawn Xiaodong Song
Paragraph: Thwarting Signature Learning by Training Maliciously. [Citation Graph (0, 0)][DBLP] RAID, 2006, pp:81-105 [Conf]
- James Newsome, Dawn Xiaodong Song
GEM: graph eMbedding for routing and data-centric storage in sensor networks without geographic information. [Citation Graph (0, 0)][DBLP] SenSys, 2003, pp:76-88 [Conf]
- David Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha
Towards Automatic Generation of Vulnerability-Based Signatures. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:2-16 [Conf]
- James Newsome, Brad Karp, Dawn Xiaodong Song
Polygraph: Automatically Generating Signatures for Polymorphic Worms. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2005, pp:226-241 [Conf]
- Joseph Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Xiaodong Song
Sweeper: a lightweight end-to-end system for defending against fast worms. [Citation Graph (0, 0)][DBLP] EuroSys, 2007, pp:115-128 [Conf]
BitBlaze: A New Approach to Computer Security via Binary Analysis. [Citation Graph (, )][DBLP]
Measuring channel capacity to distinguish undue influence. [Citation Graph (, )][DBLP]
Search in 0.043secs, Finished in 0.044secs
|