2009 |
16 | EE | Brent ByungHoon Kang,
Eric Chan-Tin,
Christopher P. Lee,
James Tyra,
Hun Jeong Kang,
Chris Nunnery,
Zachariah Wadler,
Greg Sinclair,
Nicholas Hopper,
David Dagon,
Yongdae Kim:
Towards complete node enumeration in a peer-to-peer botnet.
ASIACCS 2009: 23-34 |
2008 |
15 | | Wenke Lee,
Cliff Wang,
David Dagon:
Botnet Detection: Countering the Largest Security Threat
Springer 2008 |
14 | EE | David Dagon,
Manos Antonakakis,
Paul Vixie,
Tatuya Jinmei,
Wenke Lee:
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries.
ACM Conference on Computer and Communications Security 2008: 211-222 |
13 | EE | Anirudh Ramachandran,
Nick Feamster,
David Dagon:
Detecting Botnet Membership with DNSBL Counterintelligence.
Botnet Detection 2008: 131-142 |
12 | EE | David Dagon,
Guofei Gu,
Christopher Lee:
A Taxonomy of Botnet Structures.
Botnet Detection 2008: 143-164 |
2007 |
11 | EE | David Dagon,
Guofei Gu,
Christopher P. Lee,
Wenke Lee:
A Taxonomy of Botnet Structures.
ACSAC 2007: 325-339 |
2006 |
10 | EE | Paul Royal,
Mitch Halpin,
David Dagon,
Robert Edmonds,
Wenke Lee:
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware.
ACSAC 2006: 289-300 |
9 | EE | Guofei Gu,
Prahlad Fogla,
David Dagon,
Wenke Lee,
Boris Skoric:
Measuring intrusion detection capability: an information-theoretic approach.
ASIACCS 2006: 90-101 |
8 | EE | Collin Mulliner,
Giovanni Vigna,
David Dagon,
Wenke Lee:
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones.
DIMVA 2006: 91-108 |
7 | EE | Guofei Gu,
Prahlad Fogla,
David Dagon,
Wenke Lee,
Boris Skoric:
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
ESORICS 2006: 527-546 |
6 | EE | Roberto Perdisci,
David Dagon,
Wenke Lee,
Prahlad Fogla,
Monirul I. Sharif:
MisleadingWorm Signature Generators Using Deliberate Noise Injection.
IEEE Symposium on Security and Privacy 2006: 17-31 |
5 | EE | David Dagon,
Cliff Changchun Zou,
Wenke Lee:
Modeling Botnet Propagation Using Time Zones.
NDSS 2006 |
2005 |
4 | EE | David Dagon,
Wenke Lee,
Richard J. Lipton:
Protecting Secret Data from Insider Attacks.
Financial Cryptography 2005: 16-30 |
3 | EE | Jonathon T. Giffin,
David Dagon,
Somesh Jha,
Wenke Lee,
Barton P. Miller:
Environment-Sensitive Intrusion Detection.
RAID 2005: 185-206 |
2004 |
2 | EE | Guofei Gu,
Monirul I. Sharif,
Xinzhou Qin,
David Dagon,
Wenke Lee,
George F. Riley:
Worm Detection, Early Warning and Response Based on Local Victim Information.
ACSAC 2004: 136-145 |
1 | EE | David Dagon,
Xinzhou Qin,
Guofei Gu,
Wenke Lee,
Julian B. Grizzard,
John G. Levine,
Henry L. Owen:
HoneyStat: Local Worm Detection Using Honeypots.
RAID 2004: 39-58 |