dblp.uni-trier.dewww.uni-trier.de

Julian B. Grizzard

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
8EEGregory J. Conti, Kulsoom Abdullah, Julian B. Grizzard, John T. Stasko, John A. Copeland, Mustaque Ahamad, Henry L. Owen, Christopher P. Lee: Countering Security Information Overload through Alert and Packet Visualization. IEEE Computer Graphics and Applications 26(2): 60-70 (2006)
7EEJohn G. Levine, Julian B. Grizzard, Henry L. Owen: Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection. IEEE Security & Privacy 4(1): 24-32 (2006)
2005
6EEGregory J. Conti, Julian B. Grizzard, Mustaque Ahamad, Henry L. Owen: Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. VizSEC 2005: 10
2004
5EEJulian B. Grizzard, John G. Levine, Henry L. Owen: Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table. ESORICS 2004: 369-384
4EEJohn G. Levine, Julian B. Grizzard, Henry L. Owen: A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. IWIA 2004: 107-128
3EEJulian B. Grizzard, Sven Krasser, Henry L. Owen, Gregory J. Conti, Eric R. Dodson: Towards an Approach for Automatically Repairing Compromised Network Systems. NCA 2004: 389-392
2EEDavid Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen: HoneyStat: Local Worm Detection Using Honeypots. RAID 2004: 39-58
1EEJohn G. Levine, Julian B. Grizzard, Henry L. Owen: Using Honeynets to Protect Large Enterprise Networks. IEEE Security & Privacy 2(6): 73-75 (2004)

Coauthor Index

1Kulsoom Abdullah [8]
2Mustaque Ahamad [6] [8]
3Gregory J. Conti [3] [6] [8]
4John A. Copeland [8]
5David Dagon [2]
6Eric R. Dodson [3]
7Guofei Gu [2]
8Sven Krasser [3]
9Christopher P. Lee [8]
10Wenke Lee [2]
11John G. Levine [1] [2] [4] [5] [7]
12Henry L. Owen [1] [2] [3] [4] [5] [6] [7] [8]
13Xinzhou Qin [2]
14John T. Stasko [8]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)