BibTeX records: Niels Provos

download as .bib file

@inproceedings{DBLP:conf/uss/ThomasCRPPDSTTC16,
  author       = {Kurt Thomas and
                  Juan A. Elices Crespo and
                  Ryan Rasti and
                  Jean Michel Picod and
                  Cait Phillips and
                  Marc{-}Andr{\'{e}} Decoste and
                  Chris Sharp and
                  Fabio Tirelo and
                  Ali Tofigh and
                  Marc{-}Antoine Courteau and
                  Lucas Ballard and
                  Robert Shield and
                  Nav Jagpal and
                  Moheeb Abu Rajab and
                  Panayiotis Mavrommatis and
                  Niels Provos and
                  Elie Bursztein and
                  Damon McCoy},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Investigating Commercial Pay-Per-Install and the Distribution of Unwanted
                  Software},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {721--739},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/thomas},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ThomasCRPPDSTTC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ThomasBGHJKMNPP15,
  author       = {Kurt Thomas and
                  Elie Bursztein and
                  Chris Grier and
                  Grant Ho and
                  Nav Jagpal and
                  Alexandros Kapravelos and
                  Damon McCoy and
                  Antonio Nappa and
                  Vern Paxson and
                  Paul Pearce and
                  Niels Provos and
                  Moheeb Abu Rajab},
  title        = {Ad Injection at Scale: Assessing Deceptive Advertisement Modifications},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {151--167},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.17},
  doi          = {10.1109/SP.2015.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ThomasBGHJKMNPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JagpalDGMPRT15,
  author       = {Nav Jagpal and
                  Eric Dingle and
                  Jean{-}Philippe Gravel and
                  Panayiotis Mavrommatis and
                  Niels Provos and
                  Moheeb Abu Rajab and
                  Kurt Thomas},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Trends and Lessons from Three Years Fighting Malicious Extensions},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {579--593},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/jagpal},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JagpalDGMPRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/HoBBP14,
  author       = {Grant Ho and
                  Dan Boneh and
                  Lucas Ballard and
                  Niels Provos},
  editor       = {Sergey Bratus and
                  Felix "FX" Lindner},
  title        = {Tick Tock: Building Browser Red Pills from Timing Side Channels},
  booktitle    = {8th {USENIX} Workshop on Offensive Technologies, {WOOT} '14, San Diego,
                  CA, USA, August 19, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/woot14/workshop-program/presentation/ho},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/HoBBP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/RajabBLMP13,
  author       = {Moheeb Abu Rajab and
                  Lucas Ballard and
                  Noe Lutz and
                  Panayiotis Mavrommatis and
                  Niels Provos},
  title        = {{CAMP:} Content-Agnostic Malware Protection},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/camp-content-agnostic-malware-protection},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/RajabBLMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GrierBCCDLMMNPPRRRTPSV12,
  author       = {Chris Grier and
                  Lucas Ballard and
                  Juan Caballero and
                  Neha Chachra and
                  Christian J. Dietrich and
                  Kirill Levchenko and
                  Panayiotis Mavrommatis and
                  Damon McCoy and
                  Antonio Nappa and
                  Andreas Pitsillidis and
                  Niels Provos and
                  M. Zubair Rafique and
                  Moheeb Abu Rajab and
                  Christian Rossow and
                  Kurt Thomas and
                  Vern Paxson and
                  Stefan Savage and
                  Geoffrey M. Voelker},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Manufacturing compromise: the emergence of exploit-as-a-service},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {821--832},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382283},
  doi          = {10.1145/2382196.2382283},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GrierBCCDLMMNPPRRRTPSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SnowKMP11,
  author       = {Kevin Z. Snow and
                  Srinivas Krishnan and
                  Fabian Monrose and
                  Niels Provos},
  title        = {{SHELLOS:} Enabling Fast Detection and Forensic Analysis of Code Injection
                  Attacks},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Snow.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SnowKMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Provos11,
  author       = {Niels Provos},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Firewall},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {471--474},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_506},
  doi          = {10.1007/978-1-4419-5906-5\_506},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Provos11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/RajabMP10,
  author       = {Moheeb Abu Rajab and
                  Fabian Monrose and
                  Niels Provos},
  title        = {Peeking Through the Cloud: Client Density Estimation via {DNS} Cache
                  Probing},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {10},
  number       = {3},
  pages        = {9:1--9:21},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852096.1852097},
  doi          = {10.1145/1852096.1852097},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/RajabMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/RajabBMPZ10,
  author       = {Moheeb Abu Rajab and
                  Lucas Ballard and
                  Panayiotis Mavrommatis and
                  Niels Provos and
                  Xin Zhao},
  title        = {The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution},
  journal      = {login Usenix Mag.},
  volume       = {35},
  number       = {6},
  year         = {2010},
  url          = {https://www.usenix.org/publications/login/december-2010-volume-35-number-6/nocebo-effect-web-analysis-fake-anti-virus},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/RajabBMPZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/RajabBMPZ10,
  author       = {Moheeb Abu Rajab and
                  Lucas Ballard and
                  Panayiotis Mavrommatis and
                  Niels Provos and
                  Xin Zhao},
  editor       = {Michael D. Bailey},
  title        = {The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution},
  booktitle    = {3rd {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '10, San Jose, CA, USA, April 27, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/leet-10/nocebo-effect-web-analysis-fake-anti-virus-distribution},
  timestamp    = {Mon, 20 Nov 2023 09:09:49 +0100},
  biburl       = {https://dblp.org/rec/conf/leet/RajabBMPZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/ProvosRM09,
  author       = {Niels Provos and
                  Moheeb Abu Rajab and
                  Panayiotis Mavrommatis},
  title        = {Cybercrime 2.0: when the cloud turns dark},
  journal      = {Commun. {ACM}},
  volume       = {52},
  number       = {4},
  pages        = {42--47},
  year         = {2009},
  url          = {https://doi.org/10.1145/1498765.1498782},
  doi          = {10.1145/1498765.1498782},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/ProvosRM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/ProvosRM09,
  author       = {Niels Provos and
                  Moheeb Abu Rajab and
                  Panayiotis Mavrommatis},
  title        = {Cybercrime 2.0: When the Cloud Turns Dark},
  journal      = {{ACM} Queue},
  volume       = {7},
  number       = {2},
  pages        = {46--47},
  year         = {2009},
  url          = {https://doi.org/10.1145/1515964.1517412},
  doi          = {10.1145/1515964.1517412},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/queue/ProvosRM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0022130,
  author       = {Niels Provos and
                  Thorsten Holz},
  title        = {Virtual Honeypots - From Botnet Tracking to Intrusion Detection},
  publisher    = {Addison-Wesley},
  year         = {2008},
  isbn         = {978-0-321-33632-3},
  timestamp    = {Wed, 16 Mar 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0022130.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/RajabMTP08,
  author       = {Moheeb Abu Rajab and
                  Fabian Monrose and
                  Andreas Terzis and
                  Niels Provos},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Peeking Through the Cloud: DNS-Based Estimation and Its Applications},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {21--38},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_2},
  doi          = {10.1007/978-3-540-68914-0\_2},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/RajabMTP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DagonPLL08,
  author       = {David Dagon and
                  Niels Provos and
                  Christopher P. Lee and
                  Wenke Lee},
  title        = {Corrupted {DNS} Resolution Paths: The Rise of a Malicious Resolution
                  Authority},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
                  2008},
  publisher    = {The Internet Society},
  year         = {2008},
  url          = {https://www.ndss-symposium.org/ndss2008/corrupted-dns-resolution-paths-the-rise-of-a-malicious-resolution-authority/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/DagonPLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/PolychronakisP08,
  author       = {Michalis Polychronakis and
                  Niels Provos},
  editor       = {Fabian Monrose},
  title        = {Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware},
  booktitle    = {First {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '08, San Francisco, CA, USA, April 15, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/leet08/tech/full\_papers/polychronakis/polychronakis.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/PolychronakisP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ProvosMRM08,
  author       = {Niels Provos and
                  Panayiotis Mavrommatis and
                  Moheeb Abu Rajab and
                  Fabian Monrose},
  editor       = {Paul C. van Oorschot},
  title        = {All Your iFRAMEs Point to Us},
  booktitle    = {Proceedings of the 17th {USENIX} Security Symposium, July 28-August
                  1, 2008, San Jose, CA, {USA}},
  pages        = {1--16},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/sec08/tech/full\_papers/provos/provos.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ProvosMRM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SmallMMPS08,
  author       = {Sam Small and
                  Joshua Mason and
                  Fabian Monrose and
                  Niels Provos and
                  Adam Stubblefield},
  editor       = {Paul C. van Oorschot},
  title        = {To Catch a Predator: {A} Natural Language Approach for Eliciting Malicious
                  Payloads},
  booktitle    = {Proceedings of the 17th {USENIX} Security Symposium, July 28-August
                  1, 2008, San Jose, CA, {USA}},
  pages        = {171--184},
  publisher    = {{USENIX} Association},
  year         = {2008},
  timestamp    = {Thu, 01 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SmallMMPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2008hotsec,
  editor       = {Niels Provos},
  title        = {3rd {USENIX} Workshop on Hot Topics in Security, HotSec'08, San Jose,
                  CA, USA, July 29, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/2008hotsec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/ProvosMMWM07,
  author       = {Niels Provos and
                  Dean McNamee and
                  Panayiotis Mavrommatis and
                  Ke Wang and
                  Nagendra Modadugu},
  editor       = {Niels Provos},
  title        = {The Ghost in the Browser: Analysis of Web-based Malware},
  booktitle    = {First Workshop on Hot Topics in Understanding Botnets, HotBots'07,
                  Cambridge, MA, USA, April 10, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/hotbots-07/ghost-browser-analysis-web-based-malware},
  timestamp    = {Thu, 12 Aug 2021 18:19:16 +0200},
  biburl       = {https://dblp.org/rec/conf/nsdi/ProvosMMWM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nsdi/2007hotbots,
  editor       = {Niels Provos},
  title        = {First Workshop on Hot Topics in Understanding Botnets, HotBots'07,
                  Cambridge, MA, USA, April 10, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/hotbots07},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsdi/2007hotbots.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2007,
  editor       = {Niels Provos},
  title        = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA,
                  August 6-10, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/legacy/events/sec07/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/CasadoCAP06,
  author       = {Mart{\'{\i}}n Casado and
                  Pei Cao and
                  Aditya Akella and
                  Niels Provos},
  title        = {Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS
                  Flooding Attacks},
  booktitle    = {Quality of Service - IWQoS 2006: 14th International Workshop, IWQoS
                  2006, New Haven, CT, USA, 19-21 June 2006, Proceedings},
  pages        = {286--287},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWQOS.2006.250484},
  doi          = {10.1109/IWQOS.2006.250484},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/CasadoCAP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sruti/CasadoACPS06,
  author       = {Mart{\'{\i}}n Casado and
                  Aditya Akella and
                  Pei Cao and
                  Niels Provos and
                  Scott Shenker},
  editor       = {Steven M. Bellovin},
  title        = {Cookies Along Trust-Boundaries {(CAT):} Accurate and Deployable Flood
                  Protection},
  booktitle    = {2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet,
                  SRUTI'06, San Jose, CA, USA, July 7, 2006},
  publisher    = {{USENIX} Association},
  year         = {2006},
  url          = {https://www.usenix.org/conference/sruti-06/cookies-along-trust-boundaries-cat-accurate-and-deployable-flood-protection},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/sruti/CasadoACPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worm/ProvosMW06,
  author       = {Niels Provos and
                  Joe McClain and
                  Ke Wang},
  editor       = {Farnam Jahanian},
  title        = {Search worms},
  booktitle    = {Proceedings of the 2006 {ACM} Workshop on Rapid Malcode, {WORM} 2006,
                  Alexandria, VA, USA, November 3, 2006},
  pages        = {1--8},
  publisher    = {{ACM} Press},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179542.1179544},
  doi          = {10.1145/1179542.1179544},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/worm/ProvosMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4419,
  author       = {Markus Friedl and
                  Niels Provos and
                  William Allen Simpson},
  title        = {Diffie-Hellman Group Exchange for the Secure Shell {(SSH)} Transport
                  Layer Protocol},
  journal      = {{RFC}},
  volume       = {4419},
  pages        = {1--10},
  year         = {2006},
  url          = {https://doi.org/10.17487/RFC4419},
  doi          = {10.17487/RFC4419},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4419.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/BaileyCJPRW05,
  author       = {Michael D. Bailey and
                  Evan Cooke and
                  Farnam Jahanian and
                  Niels Provos and
                  Karl Rosaen and
                  David Watson},
  title        = {Data Reduction for the Scalable Automated Analysis of Distributed
                  Darknet Traffic},
  booktitle    = {Proceedings of the 5th Internet Measurement Conference, {IMC} 2005,
                  Berkeley, California, USA, October 19-21, 2005},
  pages        = {239--252},
  publisher    = {{USENIX} Association},
  year         = {2005},
  url          = {http://www.usenix.org/events/imc05/tech/bailey.html},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/BaileyCJPRW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Provos05,
  author       = {Niels Provos},
  editor       = {Henk C. A. van Tilborg},
  title        = {Firewall},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_169},
  doi          = {10.1007/0-387-23483-7\_169},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Provos05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Provos04,
  author       = {Niels Provos},
  editor       = {Matt Blaze},
  title        = {A Virtual Honeypot Framework},
  booktitle    = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13,
                  2004, San Diego, CA, {USA}},
  pages        = {1--14},
  publisher    = {{USENIX}},
  year         = {2004},
  url          = {http://www.usenix.org/publications/library/proceedings/sec04/tech/provos.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Provos04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Provos03,
  author       = {Niels Provos},
  title        = {Statistical steganalysis},
  school       = {University of Michigan, {USA}},
  year         = {2003},
  url          = {https://hdl.handle.net/2027.42/123936},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Provos03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ProvosH03,
  author       = {Niels Provos and
                  Peter Honeyman},
  title        = {Hide and Seek: An Introduction to Steganography},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {32--44},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1203220},
  doi          = {10.1109/MSECP.2003.1203220},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ProvosH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Provos03,
  author       = {Niels Provos},
  title        = {Improving Host Security with System Call Policies},
  booktitle    = {Proceedings of the 12th {USENIX} Security Symposium, Washington, D.C.,
                  USA, August 4-8, 2003},
  publisher    = {{USENIX} Association},
  year         = {2003},
  url          = {https://www.usenix.org/conference/12th-usenix-security-symposium/improving-host-security-system-call-policies},
  timestamp    = {Mon, 01 Feb 2021 08:43:16 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Provos03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ProvosFH03,
  author       = {Niels Provos and
                  Markus Friedl and
                  Peter Honeyman},
  title        = {Preventing Privilege Escalation},
  booktitle    = {Proceedings of the 12th {USENIX} Security Symposium, Washington, D.C.,
                  USA, August 4-8, 2003},
  publisher    = {{USENIX} Association},
  year         = {2003},
  url          = {https://www.usenix.org/conference/12th-usenix-security-symposium/preventing-privilege-escalation},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ProvosFH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ProvosH02,
  author       = {Niels Provos and
                  Peter Honeyman},
  title        = {Detecting Steganographic Content on the Internet},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2002, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2002},
  url          = {https://www.ndss-symposium.org/ndss2002/detecting-steganographic-content-internet/},
  timestamp    = {Mon, 01 Feb 2021 08:42:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ProvosH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/ProvosH01,
  author       = {Niels Provos and
                  Peter Honeyman},
  editor       = {Mark Burgess},
  title        = {ScanSSH: Scanning the Internet for {SSH} Servers},
  booktitle    = {Proceedings of the 15th Conference on Systems Administration {(LISA}
                  2001), San Diego, California, USA, December 2-7, 2001},
  pages        = {25--30},
  publisher    = {{USENIX}},
  year         = {2001},
  url          = {http://www.usenix.org/publications/library/proceedings/lisa2001/tech/provos.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/ProvosH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Provos01,
  author       = {Niels Provos},
  editor       = {Dan S. Wallach},
  title        = {Defending Against Statistical Steganalysis},
  booktitle    = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington,
                  D.C., {USA}},
  publisher    = {{USENIX}},
  year         = {2001},
  url          = {http://www.usenix.org/publications/library/proceedings/sec01/provos.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Provos01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/alsc/ProvosLT00,
  author       = {Niels Provos and
                  Chuck Lever and
                  Stephen Tweedie},
  title        = {Analyzing the Overload Behavior of a Simple Web Server},
  booktitle    = {4th Annual Linux Showcase {\&} Conference 2000, Atlanta, Georgia,
                  USA, October 10-14, 2000},
  publisher    = {{USENIX} Association},
  year         = {2000},
  url          = {https://www.usenix.org/conference/als-2000/analyzing-overload-behavior-simple-web-server},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/alsc/ProvosLT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/ProvosL00,
  author       = {Niels Provos and
                  Chuck Lever},
  title        = {Scalable Network {I/O} in Linux},
  booktitle    = {Proceedings of the Freenix Track: 2000 {USENIX} Annual Technical Conference,
                  June 18-23, 2000, San Diego, CA, {USA}},
  pages        = {109--120},
  publisher    = {{USENIX}},
  year         = {2000},
  url          = {http://www.usenix.org/publications/library/proceedings/usenix2000/freenix/provos.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/ProvosL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Provos00,
  author       = {Niels Provos},
  editor       = {Steven M. Bellovin and
                  Greg Rose},
  title        = {Encrypting Virtual Memory},
  booktitle    = {9th {USENIX} Security Symposium, Denver, Colorado, USA, August 14-17,
                  2000},
  publisher    = {{USENIX} Association},
  year         = {2000},
  url          = {https://www.usenix.org/conference/9th-usenix-security-symposium/encrypting-virtual-memory},
  timestamp    = {Mon, 01 Feb 2021 08:43:02 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Provos00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc2857,
  author       = {Angelos D. Keromytis and
                  Niels Provos},
  title        = {The Use of {HMAC-RIPEMD-160-96} within {ESP} and {AH}},
  journal      = {{RFC}},
  volume       = {2857},
  pages        = {1--7},
  year         = {2000},
  url          = {https://doi.org/10.17487/RFC2857},
  doi          = {10.17487/RFC2857},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc2857.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/ProvosM99,
  author       = {Niels Provos and
                  David Mazi{\`{e}}res},
  title        = {A Future-Adaptable Password Scheme},
  booktitle    = {Proceedings of the {FREENIX} Track: 1999 {USENIX} Annual Technical
                  Conference, June 6-11, 1999, Monterey, California, {USA}},
  pages        = {81--91},
  publisher    = {{USENIX}},
  year         = {1999},
  url          = {http://www.usenix.org/events/usenix99/provos.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/ProvosM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/RaadtHGKP99,
  author       = {Theo de Raadt and
                  Niklas Hallqvist and
                  Artur Grabowski and
                  Angelos D. Keromytis and
                  Niels Provos},
  title        = {Cryptography in OpenBSD: An Overview},
  booktitle    = {Proceedings of the {FREENIX} Track: 1999 {USENIX} Annual Technical
                  Conference, June 6-11, 1999, Monterey, California, {USA}},
  pages        = {93--101},
  publisher    = {{USENIX}},
  year         = {1999},
  url          = {http://www.usenix.org/events/usenix99/deraadt.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/RaadtHGKP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics