dblp.uni-trier.dewww.uni-trier.de

Monirul I. Sharif

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
8EEArtem Dinaburg, Paul Royal, Monirul I. Sharif, Wenke Lee: Ether: malware analysis via hardware virtualization extensions. ACM Conference on Computer and Communications Security 2008: 51-62
7EEMonirul I. Sharif, Vinod Yegneswaran, Hassen Saïdi, Phillip A. Porras, Wenke Lee: Eureka: A Framework for Enabling Static Malware Analysis. ESORICS 2008: 481-500
6EEBryan D. Payne, Martim Carbone, Monirul I. Sharif, Wenke Lee: Lares: An Architecture for Secure Active Monitoring Using Virtualization. IEEE Symposium on Security and Privacy 2008: 233-247
2007
5EEMonirul I. Sharif, Kapil Singh, Jonathon T. Giffin, Wenke Lee: Understanding Precision in Host Based Intrusion Detection. RAID 2007: 21-41
2006
4EERoberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul I. Sharif: MisleadingWorm Signature Generators Using Deliberate Noise Injection. IEEE Symposium on Security and Privacy 2006: 17-31
2005
3EEMonirul I. Sharif, George F. Riley, Wenke Lee: Comparative Study between Analytical Models and Packet-Level Worm Simulations. PADS 2005: 88-98
2004
2EEGuofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley: Worm Detection, Early Warning and Response Based on Local Victim Information. ACSAC 2004: 136-145
1EEGeorge F. Riley, Monirul I. Sharif, Wenke Lee: Simulating Internet Worms. MASCOTS 2004: 268-274

Coauthor Index

1Martim Carbone [6]
2David Dagon [2] [4]
3Artem Dinaburg [8]
4Prahlad Fogla [4]
5Jonathon T. Giffin [5]
6Guofei Gu [2]
7Wenke Lee [1] [2] [3] [4] [5] [6] [7] [8]
8Bryan D. Payne [6]
9Roberto Perdisci [4]
10Phillip A. Porras [7]
11Xinzhou Qin [2]
12George F. Riley [1] [2] [3]
13Paul Royal [8]
14Hassen Saïdi [7]
15Kapil Singh [5]
16Vinod Yegneswaran [7]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)