The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

James Newsome: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. James Newsome, David Brumley, Jason Franklin, Dawn Xiaodong Song
    Replayer: automatic protocol replay by binary analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:311-321 [Conf]
  2. James Newsome, Elaine Shi, Dawn Xiaodong Song, Adrian Perrig
    The sybil attack in sensor networks: analysis & defenses. [Citation Graph (0, 0)][DBLP]
    IPSN, 2004, pp:259-268 [Conf]
  3. James Newsome, David Brumley, Dawn Xiaodong Song
    Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  4. James Newsome, Dawn Xiaodong Song
    Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  5. James Newsome, Brad Karp, Dawn Xiaodong Song
    Paragraph: Thwarting Signature Learning by Training Maliciously. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:81-105 [Conf]
  6. James Newsome, Dawn Xiaodong Song
    GEM: graph eMbedding for routing and data-centric storage in sensor networks without geographic information. [Citation Graph (0, 0)][DBLP]
    SenSys, 2003, pp:76-88 [Conf]
  7. David Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha
    Towards Automatic Generation of Vulnerability-Based Signatures. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:2-16 [Conf]
  8. James Newsome, Brad Karp, Dawn Xiaodong Song
    Polygraph: Automatically Generating Signatures for Polymorphic Worms. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:226-241 [Conf]
  9. Joseph Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Xiaodong Song
    Sweeper: a lightweight end-to-end system for defending against fast worms. [Citation Graph (0, 0)][DBLP]
    EuroSys, 2007, pp:115-128 [Conf]

  10. BitBlaze: A New Approach to Computer Security via Binary Analysis. [Citation Graph (, )][DBLP]


  11. Measuring channel capacity to distinguish undue influence. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002