Παρακολούθηση
Michael Donald Bailey
Michael Donald Bailey
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα gatech.edu - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Understanding the Mirai Botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
23402017
The matter of heartbleed
Z Durumeric, F Li, J Kasten, J Amann, J Beekman, M Payer, N Weaver, ...
Proceedings of the 2014 conference on internet measurement conference, 475-488, 2014
10332014
Automated classification and analysis of internet malware
M Bailey, J Oberheide, J Andersen, ZM Mao, F Jahanian, J Nazario
International Workshop on Recent Advances in Intrusion Detection, 178-197, 2007
8692007
A search engine backed by Internet-wide scanning
Z Durumeric, D Adrian, A Mirian, M Bailey, JA Halderman
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
5632015
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
X Chen, J Andersen, ZM Mao, M Bailey, J Nazario
2008 IEEE International Conference on Dependable Systems & Networks With …, 2008
4912008
Analysis of the HTTPS certificate ecosystem
Z Durumeric, J Kasten, M Bailey, JA Halderman
Proceedings of the 2013 conference on Internet measurement conference, 291-304, 2013
4152013
The Internet Motion Sensor-A Distributed Blackhole Monitoring System.
M Bailey, E Cooke, F Jahanian, J Nazario, D Watson
NDSS, 2005
3952005
Bohatei: Flexible and Elastic DDoS Defense.
SK Fayaz, Y Tobioka, V Sekar, M Bailey
USENIX Security Symposium, 817-832, 2015
3542015
A survey of botnet technology and defenses
M Bailey, E Cooke, F Jahanian, Y Xu, M Karir
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
3502009
An exploration of L2 cache covert channels in virtualized environments
Y Xu, M Bailey, F Jahanian, K Joshi, M Hiltunen, R Schlichting
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 29-40, 2011
3332011
Bobtail: Avoiding Long Tails in the Cloud.
Y Xu, Z Musgrave, B Noble, M Bailey
NSDI 13, 329-342, 2013
2932013
Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents.
Y Liu, A Sarabi, J Zhang, P Naghizadeh, M Karir, M Bailey, M Liu
USENIX Security Symposium, 1009-1024, 2015
2342015
An Internet-Wide View of Internet-Wide Scanning.
Z Durumeric, M Bailey, JA Halderman
USENIX Security Symposium, 65-78, 2014
2242014
Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks
J Czyz, M Kallitsis, M Gharaibeh, C Papadopoulos, M Bailey, M Karir
Proceedings of the 2014 Conference on Internet Measurement Conference, 435-448, 2014
2232014
Skill Squatting Attacks on Amazon Alexa
D Kumar, R Paccagnella, P Murley, E Hennenfent, J Mason, A Bates, ...
27th USENIX Security Symposium (USENIX Security '18), 2018
2112018
The Security Impact of HTTPS Interception
Z Durumeric, Z Ma, D Springall, R Barnes, N Sullivan, E Bursztein, ...
Network and Distributed Systems Symposium (NDSS’17), 2017
2002017
Internet background radiation revisited
E Wustrow, M Karir, M Bailey, F Jahanian, G Huston
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 62-74, 2010
1992010
Measuring ipv6 adoption
J Czyz, M Allman, J Zhang, S Iekel-Johnson, E Osterweil, M Bailey
Proceedings of the 2015 ACM SIGCOMM Conference, 2015
1962015
Shades of Grey: On the effectiveness of reputation-based “blacklists”
S Sinha, M Bailey, F Jahanian
2008 3rd International Conference on Malicious and Unwanted Software …, 2008
1932008
The blaster worm: Then and now
M Bailey, E Cooke, F Jahanian, D Watson
IEEE Security & Privacy 3 (4), 26-31, 2005
1892005
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20