2008 |
12 | EE | Majd Al-kofahi,
Su Chang,
Thomas E. Daniels:
SCWIM an Integrity Model for SOA Networks.
ICWS 2008: 675-682 |
11 | EE | Shantanu Gattani,
Thomas E. Daniels:
Reference models for network data anonymization.
NDA 2008: 41-48 |
10 | EE | Wei Wang,
Thomas E. Daniels:
A Graph Based Approach Toward Network Forensics Analysis.
ACM Trans. Inf. Syst. Secur. 12(1): (2008) |
2006 |
9 | EE | Yongping Tang,
Yema Liverpool,
Thomas E. Daniels:
Monitor placement for stepping stone analysis.
IPCCC 2006 |
8 | EE | Wei Wang,
Thomas E. Daniels:
Diffusion and graph spectral methods for network forensic analysis.
NSPW 2006: 99-106 |
2005 |
7 | EE | Wei Wang,
Thomas E. Daniels:
Building Evidence Graphs for Network Forensics Analysis.
ACSAC 2005: 254-266 |
6 | EE | Wei Wang,
Thomas E. Daniels:
Network Forensics Analysis with Evidence Graphs.
DFRWS 2005 |
5 | EE | Yongping Tang,
Thomas E. Daniels:
A Simple Framework for Distributed Forensics.
ICDCS Workshops 2005: 163-169 |
2004 |
4 | EE | Thomas E. Daniels:
A functional reference model of passive systems for tracing network traffic.
Digital Investigation 1(1): 69-81 (2004) |
2002 |
3 | EE | Florian P. Buchholz,
Thomas E. Daniels,
James P. Early,
Rajeev Gopalakrishna,
R. Patrick Gorman,
Benjamin A. Kuperman,
Sofie Nystrom,
Addam Schroll,
Andrew Smith:
Digging For Worms, Fishing For Answers.
ACSAC 2002: 219-228 |
2000 |
2 | EE | Thomas E. Daniels,
Eugene H. Spafford:
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux.
ACSAC 2000: 178-187 |
1999 |
1 | | Thomas E. Daniels,
Eugene H. Spafford:
Identification of Host Audit Data to Detect Attacks on Low-level IP Vulnerabilities.
Journal of Computer Security 7(1): 3-35 (1999) |