Author of the publication

Software asset analyzer: A system for detecting configuration anomalies.

, , , and . MILCOM, page 998-1003. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs., and . RAID, volume 4637 of Lecture Notes in Computer Science, page 276-295. Springer, (2007)On the Limits of Payload-Oblivious Network Attack Detection., and . RAID, volume 5230 of Lecture Notes in Computer Science, page 251-270. Springer, (2008)Graph-based analysis in network security.. MILCOM, page 1333-1337. IEEE, (2011)Using uncleanliness to predict future botnet addresses., , , , , , and . Internet Measurement Conference, page 93-104. ACM, (2007)Fishing for phishes: applying capture-recapture methods to estimate phishing populations., and . eCrime Researchers Summit, volume 269 of ACM International Conference Proceeding Series, page 14-25. ACM, (2007)Transient Modeling of Topology-based Worms in Networks with Link Interference., , , and . MILCOM, page 548-553. IEEE, (2023)A Cost-Based Mechanism for Evaluating the Effectiveness of Moving Target Defenses.. GameSec, volume 7638 of Lecture Notes in Computer Science, page 221-233. Springer, (2012)Software asset analyzer: A system for detecting configuration anomalies., , , and . MILCOM, page 998-1003. IEEE, (2016)Identifying and Differentiating Acknowledged Scanners in Network Traffic., , and . EuroS&P Workshops, page 567-574. IEEE, (2023)