Biblio

Export 40 results:
Filters: Author is Vern Paxson  [Clear All Filters]
2009
Kreibich C, Kanich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S.  2009.  Spamcraft: An Inside Look At Spam Campaign Orchestration. 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 09).
2008
Allman M, Kreibich C, Paxson V, Sommer R, Weaver N.  2008.  Principles for Developing Comprehensive Network Visibility. 3rd USENIX Workshop on Hot Topics in Security (HotSec 08).
Kreibich C, Kanich C, Levchenko K, Enright B, Voelker GM, Paxson V, Savage S.  2008.  On the Spam Campaign Trail. First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 08).
2007
Allman M, Kreibich C, Paxson V, Sommer R, Weaver N.  2007.  The Strengths of Weaker Identities: Opportunistic Personas. 2nd USENIX Workshop on Hot Topics in Security (HotSec 07).
2004
Weaver N, Staniford S, Paxson V.  2004.  Very Fast Containment of Scanning Worms. 13th USENIX Security Symposium (USENIX Security 04).
2002
Staniford S, Paxson V, Weaver N.  2002.  How to Own the Internet in Your Spare Time. 11th USENIX Security Symposium (USENIX Security 02).
2000
Zhang Y, Paxson V.  2000.  Detecting Backdoors. 9th USENIX Security Symposium (USENIX Security 00).
1999
Paxson V.  1999.  Experiences Learned from Bro. 1st Workshop on Intrusion Detection and Network Monitoring (ID 99).
1998
Paxson V.  1998.  Bro: A System for Detecting Network Intruders in Real-Time. 7th USENIX Security Symposium (USENIX Security 98).
1993
Paxson V, Saltmarsh C.  1993.  Glish: A User-Level Software Bus for Loosely-Coupled Distributed Systems. USENIX Winter 1993 Conference (USENIX Winter 1993 Conference).

Pages