David Dagon

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

16EEBrent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim: Towards complete node enumeration in a peer-to-peer botnet. ASIACCS 2009: 23-34
15 Wenke Lee, Cliff Wang, David Dagon: Botnet Detection: Countering the Largest Security Threat Springer 2008
14EEDavid Dagon, Manos Antonakakis, Paul Vixie, Tatuya Jinmei, Wenke Lee: Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries. ACM Conference on Computer and Communications Security 2008: 211-222
13EEAnirudh Ramachandran, Nick Feamster, David Dagon: Detecting Botnet Membership with DNSBL Counterintelligence. Botnet Detection 2008: 131-142
12EEDavid Dagon, Guofei Gu, Christopher Lee: A Taxonomy of Botnet Structures. Botnet Detection 2008: 143-164
11EEDavid Dagon, Guofei Gu, Christopher P. Lee, Wenke Lee: A Taxonomy of Botnet Structures. ACSAC 2007: 325-339
10EEPaul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee: PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. ACSAC 2006: 289-300
9EEGuofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric: Measuring intrusion detection capability: an information-theoretic approach. ASIACCS 2006: 90-101
8EECollin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee: Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. DIMVA 2006: 91-108
7EEGuofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric: Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. ESORICS 2006: 527-546
6EERoberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul I. Sharif: MisleadingWorm Signature Generators Using Deliberate Noise Injection. IEEE Symposium on Security and Privacy 2006: 17-31
5EEDavid Dagon, Cliff Changchun Zou, Wenke Lee: Modeling Botnet Propagation Using Time Zones. NDSS 2006
4EEDavid Dagon, Wenke Lee, Richard J. Lipton: Protecting Secret Data from Insider Attacks. Financial Cryptography 2005: 16-30
3EEJonathon T. Giffin, David Dagon, Somesh Jha, Wenke Lee, Barton P. Miller: Environment-Sensitive Intrusion Detection. RAID 2005: 185-206
2EEGuofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley: Worm Detection, Early Warning and Response Based on Local Victim Information. ACSAC 2004: 136-145
1EEDavid Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen: HoneyStat: Local Worm Detection Using Honeypots. RAID 2004: 39-58

Coauthor Index

1Manos Antonakakis [14]
2Eric Chan-Tin [16]
3Robert Edmonds [10]
4Nick Feamster [13]
5Prahlad Fogla [6] [7] [9]
6Jonathon T. Giffin [3]
7Julian B. Grizzard [1]
8Guofei Gu [1] [2] [7] [9] [11] [12]
9Mitch Halpin [10]
10Nicholas Hopper [16]
11Somesh Jha [3]
12Tatuya Jinmei [14]
13Brent ByungHoon Kang [16]
14Hun Jeong Kang [16]
15Yongdae Kim [16]
16Christopher Lee [12]
17Christopher P. Lee [11] [16]
18Wenke Lee [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [14] [15]
19John G. Levine [1]
20Richard J. Lipton [4]
21Barton P. Miller [3]
22Collin Mulliner [8]
23Chris Nunnery [16]
24Henry L. Owen [1]
25Roberto Perdisci [6]
26Xinzhou Qin [1] [2]
27Anirudh Ramachandran [13]
28George F. Riley [2]
29Paul Royal [10]
30Monirul I. Sharif [2] [6]
31Greg Sinclair [16]
32Boris Skoric [7] [9]
33James Tyra [16]
34Giovanni Vigna [8]
35Paul Vixie [14]
36Zachariah Wadler [16]
37Cliff Wang [15]
38Cliff Changchun Zou [5]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)