Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Julian B. Grizzard
@inproceedings{DBLP:conf/hicss/BurnsPG11, author = {Luanne Burns and J. Aaron Pendergrass and Julian B. Grizzard}, title = {{KAFE:} Kernel Analysis Front-End for Software Assurance}, booktitle = {44th Hawaii International International Conference on Systems Science {(HICSS-44} 2011), Proceedings, 4-7 January 2011, Koloa, Kauai, HI, {USA}}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/HICSS.2011.266}, doi = {10.1109/HICSS.2011.266}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/BurnsPG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SaurG10, author = {Karla Saur and Julian B. Grizzard}, title = {Locating {\texttimes}86 paging structures in memory images}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {28--37}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.08.002}, doi = {10.1016/J.DIIN.2010.08.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SaurG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/Grizzard0NKD07, author = {Julian B. Grizzard and Vikram Sharma and Chris Nunnery and Brent ByungHoon Kang and David Dagon}, editor = {Niels Provos}, title = {Peer-to-Peer Botnets: Overview and Case Study}, booktitle = {First Workshop on Hot Topics in Understanding Botnets, HotBots'07, Cambridge, MA, USA, April 10, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/hotbots-07/peer-peer-botnets-overview-and-case-study}, timestamp = {Thu, 12 Aug 2021 18:19:16 +0200}, biburl = {https://dblp.org/rec/conf/nsdi/Grizzard0NKD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cga/ContiAGSCAOL06, author = {Gregory J. Conti and Kulsoom Abdullah and Julian B. Grizzard and John T. Stasko and John A. Copeland and Mustaque Ahamad and Henry L. Owen and Christopher P. Lee}, title = {Countering Security Information Overload through Alert and Packet Visualization}, journal = {{IEEE} Computer Graphics and Applications}, volume = {26}, number = {2}, pages = {60--70}, year = {2006}, url = {https://doi.org/10.1109/MCG.2006.30}, doi = {10.1109/MCG.2006.30}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cga/ContiAGSCAOL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LevineGO06, author = {John G. Levine and Julian B. Grizzard and Henry L. Owen}, title = {Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection}, journal = {{IEEE} Secur. Priv.}, volume = {4}, number = {1}, pages = {24--32}, year = {2006}, url = {https://doi.org/10.1109/MSP.2006.11}, doi = {10.1109/MSP.2006.11}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/LevineGO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/te/AblerCGO06, author = {Randal T. Abler and Didier Contis and Julian B. Grizzard and Henry L. Owen}, title = {Georgia tech information security center hands-on network security laboratory}, journal = {{IEEE} Trans. Educ.}, volume = {49}, number = {1}, pages = {82--87}, year = {2006}, url = {https://doi.org/10.1109/TE.2005.858403}, doi = {10.1109/TE.2005.858403}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/te/AblerCGO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ContiGAO05, author = {Gregory J. Conti and Julian B. Grizzard and Mustaque Ahamad and Henry L. Owen}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {10}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.19}, doi = {10.1109/VIZSEC.2005.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/ContiGAO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LevineGO04, author = {John G. Levine and Julian B. Grizzard and Henry L. Owen}, title = {Using Honeynets to Protect Large Enterprise Networks}, journal = {{IEEE} Secur. Priv.}, volume = {2}, number = {6}, pages = {73--75}, year = {2004}, url = {https://doi.org/10.1109/MSP.2004.115}, doi = {10.1109/MSP.2004.115}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/LevineGO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GrizzardLO04, author = {Julian B. Grizzard and John G. Levine and Henry L. Owen}, editor = {Pierangela Samarati and Peter Y. A. Ryan and Dieter Gollmann and Refik Molva}, title = {Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table}, booktitle = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3193}, pages = {369--384}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30108-0\_23}, doi = {10.1007/978-3-540-30108-0\_23}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GrizzardLO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/LevineGO04, author = {John G. Levine and Julian B. Grizzard and Henry L. Owen}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table}, booktitle = {Proceedings of the Second {IEEE} International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}}, pages = {107--128}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/IWIA.2004.1288042}, doi = {10.1109/IWIA.2004.1288042}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/LevineGO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/GrizzardKOCD04, author = {Julian B. Grizzard and Sven Krasser and Henry L. Owen and Gregory J. Conti and Eric R. Dodson}, title = {Towards an Approach for Automatically Repairing Compromised Network Systems}, booktitle = {3rd {IEEE} International Symposium on Network Computing and Applications {(NCA} 2004), 30 August - 1 September 2004, Cambridge, MA, {USA}}, pages = {389--392}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/NCA.2004.1347806}, doi = {10.1109/NCA.2004.1347806}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/GrizzardKOCD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DagonQGLGLO04, author = {David Dagon and Xinzhou Qin and Guofei Gu and Wenke Lee and Julian B. Grizzard and John G. Levine and Henry L. Owen}, editor = {Erland Jonsson and Alfonso Valdes and Magnus Almgren}, title = {HoneyStat: Local Worm Detection Using Honeypots}, booktitle = {Recent Advances in Intrusion Detection: 7th International Symposium, {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3224}, pages = {39--58}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30143-1\_3}, doi = {10.1007/978-3-540-30143-1\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/DagonQGLGLO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.