dblp.uni-trier.dewww.uni-trier.de

John G. Levine

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
8EEJohn G. Levine, Julian B. Grizzard, Henry L. Owen: Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection. IEEE Security & Privacy 4(1): 24-32 (2006)
2004
7EEJulian B. Grizzard, John G. Levine, Henry L. Owen: Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table. ESORICS 2004: 369-384
6EEJohn G. Levine, Julian B. Grizzard, Henry L. Owen: A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. IWIA 2004: 107-128
5EEDavid Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen: HoneyStat: Local Worm Detection Using Honeypots. RAID 2004: 39-58
4EEJohn G. Levine, Julian B. Grizzard, Henry L. Owen: Using Honeynets to Protect Large Enterprise Networks. IEEE Security & Privacy 2(6): 73-75 (2004)
2003
3 Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. Owen: Wireless Intrusion Detection and Response. IAW 2003: 68-75
2 John G. Levine, Richard LaBella, Henry L. Owen, Didier Contis, Brian Culver: The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks. IAW 2003: 92-99
1EENicholas Athanasiades, Randal Abler, John G. Levine, Henry L. Owen, George F. Riley: Intrusion Detection Testing and Benchmarking Methodologies. IWIA 2003: 63-72

Coauthor Index

1Randal Abler [1]
2Nicholas Athanasiades [1]
3Didier Contis [2]
4Brian Culver [2]
5David Dagon [5]
6Julian B. Grizzard [4] [5] [6] [7] [8]
7Guofei Gu [5]
8Richard LaBella [2]
9Wenke Lee [5]
10Yu-Xi Lim [3]
11Henry L. Owen [1] [2] [3] [4] [5] [6] [7] [8]
12Xinzhou Qin [5]
13George F. Riley [1]
14Tim Schmoyer [3]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)