BibTeX records: Julian B. Grizzard

download as .bib file

@inproceedings{DBLP:conf/hicss/BurnsPG11,
  author       = {Luanne Burns and
                  J. Aaron Pendergrass and
                  Julian B. Grizzard},
  title        = {{KAFE:} Kernel Analysis Front-End for Software Assurance},
  booktitle    = {44th Hawaii International International Conference on Systems Science
                  {(HICSS-44} 2011), Proceedings, 4-7 January 2011, Koloa, Kauai, HI,
                  {USA}},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/HICSS.2011.266},
  doi          = {10.1109/HICSS.2011.266},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/BurnsPG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SaurG10,
  author       = {Karla Saur and
                  Julian B. Grizzard},
  title        = {Locating {\texttimes}86 paging structures in memory images},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {28--37},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.08.002},
  doi          = {10.1016/J.DIIN.2010.08.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SaurG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/Grizzard0NKD07,
  author       = {Julian B. Grizzard and
                  Vikram Sharma and
                  Chris Nunnery and
                  Brent ByungHoon Kang and
                  David Dagon},
  editor       = {Niels Provos},
  title        = {Peer-to-Peer Botnets: Overview and Case Study},
  booktitle    = {First Workshop on Hot Topics in Understanding Botnets, HotBots'07,
                  Cambridge, MA, USA, April 10, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/hotbots-07/peer-peer-botnets-overview-and-case-study},
  timestamp    = {Thu, 12 Aug 2021 18:19:16 +0200},
  biburl       = {https://dblp.org/rec/conf/nsdi/Grizzard0NKD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cga/ContiAGSCAOL06,
  author       = {Gregory J. Conti and
                  Kulsoom Abdullah and
                  Julian B. Grizzard and
                  John T. Stasko and
                  John A. Copeland and
                  Mustaque Ahamad and
                  Henry L. Owen and
                  Christopher P. Lee},
  title        = {Countering Security Information Overload through Alert and Packet
                  Visualization},
  journal      = {{IEEE} Computer Graphics and Applications},
  volume       = {26},
  number       = {2},
  pages        = {60--70},
  year         = {2006},
  url          = {https://doi.org/10.1109/MCG.2006.30},
  doi          = {10.1109/MCG.2006.30},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cga/ContiAGSCAOL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LevineGO06,
  author       = {John G. Levine and
                  Julian B. Grizzard and
                  Henry L. Owen},
  title        = {Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {4},
  number       = {1},
  pages        = {24--32},
  year         = {2006},
  url          = {https://doi.org/10.1109/MSP.2006.11},
  doi          = {10.1109/MSP.2006.11},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LevineGO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/te/AblerCGO06,
  author       = {Randal T. Abler and
                  Didier Contis and
                  Julian B. Grizzard and
                  Henry L. Owen},
  title        = {Georgia tech information security center hands-on network security
                  laboratory},
  journal      = {{IEEE} Trans. Educ.},
  volume       = {49},
  number       = {1},
  pages        = {82--87},
  year         = {2006},
  url          = {https://doi.org/10.1109/TE.2005.858403},
  doi          = {10.1109/TE.2005.858403},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/te/AblerCGO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ContiGAO05,
  author       = {Gregory J. Conti and
                  Julian B. Grizzard and
                  Mustaque Ahamad and
                  Henry L. Owen},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Visual Exploration of Malicious Network Objects Using Semantic Zoom,
                  Interactive Encoding and Dynamic Queries},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {10},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.19},
  doi          = {10.1109/VIZSEC.2005.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/ContiGAO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LevineGO04,
  author       = {John G. Levine and
                  Julian B. Grizzard and
                  Henry L. Owen},
  title        = {Using Honeynets to Protect Large Enterprise Networks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {2},
  number       = {6},
  pages        = {73--75},
  year         = {2004},
  url          = {https://doi.org/10.1109/MSP.2004.115},
  doi          = {10.1109/MSP.2004.115},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LevineGO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GrizzardLO04,
  author       = {Julian B. Grizzard and
                  John G. Levine and
                  Henry L. Owen},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Re-establishing Trust in Compromised Systems: Recovering from Rootkits
                  That Trojan the System Call Table},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {369--384},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_23},
  doi          = {10.1007/978-3-540-30108-0\_23},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GrizzardLO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/LevineGO04,
  author       = {John G. Levine and
                  Julian B. Grizzard and
                  Henry L. Owen},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {A Methodology to Detect and Characterize Kernel Level Rootkit Exploits
                  Involving Redirection of the System Call Table},
  booktitle    = {Proceedings of the Second {IEEE} International Workshop on Information
                  Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}},
  pages        = {107--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/IWIA.2004.1288042},
  doi          = {10.1109/IWIA.2004.1288042},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/LevineGO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/GrizzardKOCD04,
  author       = {Julian B. Grizzard and
                  Sven Krasser and
                  Henry L. Owen and
                  Gregory J. Conti and
                  Eric R. Dodson},
  title        = {Towards an Approach for Automatically Repairing Compromised Network
                  Systems},
  booktitle    = {3rd {IEEE} International Symposium on Network Computing and Applications
                  {(NCA} 2004), 30 August - 1 September 2004, Cambridge, MA, {USA}},
  pages        = {389--392},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/NCA.2004.1347806},
  doi          = {10.1109/NCA.2004.1347806},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/GrizzardKOCD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DagonQGLGLO04,
  author       = {David Dagon and
                  Xinzhou Qin and
                  Guofei Gu and
                  Wenke Lee and
                  Julian B. Grizzard and
                  John G. Levine and
                  Henry L. Owen},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {HoneyStat: Local Worm Detection Using Honeypots},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {39--58},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_3},
  doi          = {10.1007/978-3-540-30143-1\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/DagonQGLGLO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics