Author of the publication

The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks.

, , , , and . IAW, page 92-99. IEEE, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mapping Wander in SONET/SDH Adaptive Threshold Modulation Pointer Processors., , and . ICC (3), page 1587-1591. IEEE, (1997)Temporal Partitioning for Partially-Reconfigurable-Field-Programmable Gate., and . IPPS/SPDP Workshops, volume 1388 of Lecture Notes in Computer Science, page 37-42. Springer, (1998)A comparison of auction and flat pricing for differentiated service networks., , and . ICC, page 2086-2091. IEEE, (2004)M-MPLS: Micromobility-enabled multiprotocol label switching., , , , , and . ICC, page 250-255. IEEE, (2003)The effects of quality of service on vehicular network pseudonym distribution in congested urban environments., , and . WCNC Workshops, page 365-370. IEEE, (2012)Visual Analysis of Program Flow Data with Data Propagation., , and . VizSEC, volume 5210 of Lecture Notes in Computer Science, page 26-35. Springer, (2008)Synchronous Digital Hierarchy Optical Metropolitan Network Ring Traffic Analysis., and . Eur. Trans. Telecommun., 4 (6): 591-597 (1993)Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table., , and . ESORICS, volume 3193 of Lecture Notes in Computer Science, page 369-384. Springer, (2004)Wireless Intrusion Detection and Response., , , and . IAW, page 68-75. IEEE, (2003)VLSI Architecture for Switch-Level Simulation.. MASCOTS, page 44-49. The Society for Computer Simulation, (1993)