![]() |
| 2008 | ||
|---|---|---|
| 4 | EE | David Brumley, James Newsome, D. Song, Hao Wang, Somesh Jha: Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures. IEEE Trans. Dependable Sec. Comput. 5(4): 224-241 (2008) |
| 2006 | ||
| 3 | EE | Abraham Yaar, Adrian Perrig, D. Song: StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense. IEEE Journal on Selected Areas in Communications 24(10): 1853-1863 (2006) |
| 2000 | ||
| 2 | EE | Adrian Perrig, D. Song: Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols. CSFW 2000: 64-76 |
| 1993 | ||
| 1 | D. Song, Eric J. Golin: Fine-Grain Visualization Algorithms in Dataflow Environments. IEEE Visualization 1993: 126-134 | |
| 1 | David Brumley | [4] |
| 2 | Eric J. Golin | [1] |
| 3 | Somesh Jha | [4] |
| 4 | James Newsome | [4] |
| 5 | Adrian Perrig | [2] [3] |
| 6 | Hao Wang | [4] |
| 7 | Abraham Yaar | [3] |