Author of the publication

Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications.

, , , , , and . I. J. Network Security, 4 (1): 69-80 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection., , , , and . SEC, volume 181 of IFIP, page 393-408. Springer, (2005)Application of computational intelligence techniques in active networks., , and . SAC, page 448-455. ACM, (2001)Scalable Resource Control in Active Networks., , , , and . IWAN, volume 1942 of Lecture Notes in Computer Science, page 343-357. Springer, (2000)Puppetnets: misusing web browsers as a distributed attack infrastructure., , , and . ACM Conference on Computer and Communications Security, page 221-234. ACM, (2006)Defending against hitlist worms using network address space randomization., , , and . WORM, page 30-40. ACM Press, (2005)Network-level polymorphic shellcode detection using emulation., , and . Journal in Computer Virology, 2 (4): 257-274 (2007)COVERAGE: detecting and reacting to worm epidemics using cooperation and validation., , , and . Int. J. Inf. Sec., 6 (6): 361-378 (2007)Efficient content-based detection of zero-day worms., , and . ICC, page 837-843. IEEE, (2005)Detecting Targeted Attacks Using Shadow Honeypots., , , , , and . USENIX Security Symposium, USENIX Association, (2005)Flexible network monitoring with FLAME., , , , and . Computer Networks, 50 (14): 2548-2563 (2006)