2006 |
8 | EE | John G. Levine,
Julian B. Grizzard,
Henry L. Owen:
Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection.
IEEE Security & Privacy 4(1): 24-32 (2006) |
2004 |
7 | EE | Julian B. Grizzard,
John G. Levine,
Henry L. Owen:
Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table.
ESORICS 2004: 369-384 |
6 | EE | John G. Levine,
Julian B. Grizzard,
Henry L. Owen:
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.
IWIA 2004: 107-128 |
5 | EE | David Dagon,
Xinzhou Qin,
Guofei Gu,
Wenke Lee,
Julian B. Grizzard,
John G. Levine,
Henry L. Owen:
HoneyStat: Local Worm Detection Using Honeypots.
RAID 2004: 39-58 |
4 | EE | John G. Levine,
Julian B. Grizzard,
Henry L. Owen:
Using Honeynets to Protect Large Enterprise Networks.
IEEE Security & Privacy 2(6): 73-75 (2004) |
2003 |
3 | | Yu-Xi Lim,
Tim Schmoyer,
John G. Levine,
Henry L. Owen:
Wireless Intrusion Detection and Response.
IAW 2003: 68-75 |
2 | | John G. Levine,
Richard LaBella,
Henry L. Owen,
Didier Contis,
Brian Culver:
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks.
IAW 2003: 92-99 |
1 | EE | Nicholas Athanasiades,
Randal Abler,
John G. Levine,
Henry L. Owen,
George F. Riley:
Intrusion Detection Testing and Benchmarking Methodologies.
IWIA 2003: 63-72 |