2006 |
8 | EE | Gregory J. Conti,
Kulsoom Abdullah,
Julian B. Grizzard,
John T. Stasko,
John A. Copeland,
Mustaque Ahamad,
Henry L. Owen,
Christopher P. Lee:
Countering Security Information Overload through Alert and Packet Visualization.
IEEE Computer Graphics and Applications 26(2): 60-70 (2006) |
7 | EE | John G. Levine,
Julian B. Grizzard,
Henry L. Owen:
Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection.
IEEE Security & Privacy 4(1): 24-32 (2006) |
2005 |
6 | EE | Gregory J. Conti,
Julian B. Grizzard,
Mustaque Ahamad,
Henry L. Owen:
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries.
VizSEC 2005: 10 |
2004 |
5 | EE | Julian B. Grizzard,
John G. Levine,
Henry L. Owen:
Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table.
ESORICS 2004: 369-384 |
4 | EE | John G. Levine,
Julian B. Grizzard,
Henry L. Owen:
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.
IWIA 2004: 107-128 |
3 | EE | Julian B. Grizzard,
Sven Krasser,
Henry L. Owen,
Gregory J. Conti,
Eric R. Dodson:
Towards an Approach for Automatically Repairing Compromised Network Systems.
NCA 2004: 389-392 |
2 | EE | David Dagon,
Xinzhou Qin,
Guofei Gu,
Wenke Lee,
Julian B. Grizzard,
John G. Levine,
Henry L. Owen:
HoneyStat: Local Worm Detection Using Honeypots.
RAID 2004: 39-58 |
1 | EE | John G. Levine,
Julian B. Grizzard,
Henry L. Owen:
Using Honeynets to Protect Large Enterprise Networks.
IEEE Security & Privacy 2(6): 73-75 (2004) |