2008 conference paper
Countering persistent kernel rootkits through systematic hook discovery
Recent advances in intrusion detection, raid 2008, 5230, 21–38.
2002 journal article
Design and implementation of a decentralized prototype system for detecting distributed attacks
COMPUTER COMMUNICATIONS, 25(15), 1374–1391.
2002 conference paper
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
In G. K. D. Gollmann & M. Waidner (Eds.), Computer security--ESORICS 2002: 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002: proceedings (Lecture notes in computer science ; 2502) (Vol. 2502, pp. 244–263). New York: Springer.
Ed(s): G. D. Gollmann & M. Waidner
chapter
DecIdUouS: decentralized source identification for network-based intrusions
Chang, H. Y., Narayan, R., Saryor, C., Jou, P., Wu, S. F., Vetter, B. M., … Yuill, J. J. In S. M. M. Sloman & E. Lupu (Eds.), Integrated network management VI: Distributed management for the networked millennium (pp. 701–714). Piscataway, NJ: IEEE Pub.
Ed(s): S. M. Sloman & E. Lupu
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.