Follow
Dave Dittrich
Dave Dittrich
Research Scientist, University of Washington
Verified email at speakeasy.net - Homepage
Title
Cited by
Cited by
Year
Internet denial of service: attack and defense mechanisms (Radia Perlman Computer Networking and Security)
J Mirkovic, S Dietrich, D Dittrich, P Reiher
Prentice Hall PTR, 2004
5782004
The Menlo Report: Ethical principles guiding information and communication technology research
D Dittrich, E Kenneally
US Department of Homeland Security, 2012
3032012
The DoS Project˘s Ħtrinoo˘distributed denial of service attack tool
D Dittrich
University of Washington 10, 1999
2401999
Analyzing distributed denial of service tools: The shaft case
S Dietrich, N Long
14th Systems Administration Conference (LISA 2000), 2000
2372000
Analysis of the Storm and Nugache Trojans: P2P is here
S Stover, D Dittrich, J Hernandez, S Dietrich
USENIX; login 32 (6), 18-27, 2007
1852007
P2P as botnet command and control: a deeper insight
D Dittrich, S Dietrich
2008 3rd International Conference on Malicious and Unwanted Software …, 2008
1672008
The menlo report
M Bailey, D Dittrich, E Kenneally, D Maughan
IEEE Security & Privacy 10 (2), 71-75, 2012
1602012
The Ħstacheldraht˘distributed denial of service attack tool
D Dittrich
Dec, 1999
1421999
The menlo report: Ethical principles guiding information and communication technology research
E Kenneally, D Dittrich
Available at SSRN 2445102, 2012
892012
The mstream distributed denial of service attack tool
D Dittrich, G Weaver, S Dietrich, N Long
University of Washington, http://staff. washington. edu/dittrich/misc …, 2000
732000
Distributed Denial of Service (DDoS) Attacks/tool
D Dittrich
http://staff. washington. edu/dittrich/misc/ddos/, 2005
712005
So You Want to Take Over a Botnet...
D Dittrich
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12), 2012
592012
Computer science security research and human subjects: Emerging considerations for research ethics boards
E Buchanan, J Aycock, S Dexter, D Dittrich, E Hvizdak
Journal of Empirical Research on Human Research Ethics 6 (2), 71-83, 2011
572011
Creating realistic corpora for security and forensic education
K Woods, CA Lee, S Garfinkel, D Dittrich, A Russell, K Kearton
562011
Distributed denial of service attacks: defenses
J Jones, DF Cohen, D Dittrich, C Huegen
Global Integrity Corporation, 1-14, 2000
512000
Building an active computer security ethics community
D Dittrich, M Bailey, S Dietrich
IEEE Security & Privacy 9 (4), 32-40, 2010
382010
Discovery techniques for P2P botnets
D Dittrich, S Dietrich
Stevens Institute of Technology CS Technical Report 4 (26), 2, 2008
372008
Towards community standards for ethical behavior in computer security research
D Dittrich, M Bailey, S Dietrich
University of Washington, Michael Bailey, University of Michigan, Sven …, 2009
322009
An Analysis of the” shaft” distributed denial of service tool
S Dietrich, N Long, D Dittrich
Proceedings of LISA 2000, 2000
322000
Distributed Denial of Service (DDoS) attacks/tools page
D Dittrich
http://staff. washington. edu/dittrich/misc/ddos, 2002
312002
The system can't perform the operation now. Try again later.
Articles 1–20