James Hoagland
James Hoagland
Uber
E-mail megerősítve itt: hoagland.org - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
Practical automated detection of stealthy portscans
S Staniford, JA Hoagland, JM McAlerney
Journal of Computer Security 10 (1-2), 105-136, 2002
7122002
GrIDS-a graph based intrusion detection system for large networks
S Staniford-Chen, S Cheung, R Crawford, M Dilger, J Frank, J Hoagland, ...
Proceedings of the 19th national information systems security conference 1 …, 1996
6901996
Security policy specification using a graphical approach
JA Hoagland, R Pandey, KN Levitt
arXiv preprint cs/9809124, 1998
1011998
Security concerns with IP tunneling
S Krishnan, D Thaler, J Hoagland
RFC6169, April, 2011
422011
Specifying and implementing security policies using LaSCO, the language for security constraints on objects
JA Hoagland
arXiv preprint cs/0003066, 2000
422000
A uniform format for IPv6 extension headers
S Krishnan, J Woodyatt, E Kline, J Hoagland, M Bhatia
RFC6564, 2012
362012
Viewing ids alerts: Lessons from snortsnarf
JA Hoagland, S Staniford
Proceedings DARPA Information Survivability Conference and Exposition II …, 2001
302001
The Teredo Protocol Tunneling Past Network Security and Other Security Implications
J Hoagland
232006
M. Bhatia," A Uniform Format for IPv6 Extension Headers
S Krishnan, J Woodyatt, E Kline, J Hoagland
RFC 6564, April, 2012
212012
Symantec internet security threat report: Trends for january-june 07
D Turner, S Entwisle, E Johnson, M Fossi, J Blackbird, D McKinney, ...
Technical report, Symantec Inc, 2007
202007
Audit Log Analysis Using the Visual Audit Browser Toolkit
J Hoagland, C Wee, K Levitt
Technical Report CSE-95-11, Department of Computer Science, University of …, 1995
201995
SPADE, Silicon Defense
J Hoagland, S Staniford
Nov, 2000
162000
Teredo security updates
D Thaler, S Krishnan, J Hoagland
RFC5991, Sept, 2010
152010
Specifying and enforcing policies using LaSCO: The language for security constraints on objects
JA Hoagland, R Pandey, KN Levitt
Department of Computer Science, University of California, Davis …, 1999
81999
Windows vista network attack surface analysis
J Hoagland, M Conover, T Newsham, O Whitehouse
Symantec Response whitepaper, 2007
72007
The Teredo Protocol: Tunneling Past Network Security and Other Security Implications, Symantec
J Hoagland
62007
Internet. Security
DSSDE EC, II ISN
3*2005
A graph-based language for specifying security policies
JA Hoagland, R Pandey, KN Levitt
citeseer. ist. psu. edu/144987. html, 0
3
Teredo Security Updates
US Krishnan, IJ Hoagl
22010
A general language for expressing security policies for enforcement
JA Hoagland, R Pandey, KN Levitt
11999
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20