Follow
James Hoagland
James Hoagland
Uber
Verified email at hoagland.org - Homepage
Title
Cited by
Cited by
Year
Practical automated detection of stealthy portscans
S Staniford, JA Hoagland, JM McAlerney
Journal of Computer Security 10 (1-2), 105-136, 2002
7782002
GrIDS-a graph based intrusion detection system for large networks
S Staniford-Chen, S Cheung, R Crawford, M Dilger, J Frank, J Hoagland, ...
Proceedings of the 19th national information systems security conference 1 …, 1996
7631996
Security policy specification using a graphical approach
JA Hoagland, R Pandey, KN Levitt
arXiv preprint cs/9809124, 1998
1091998
Security concerns with IP tunneling
S Krishnan, D Thaler, J Hoagland
472011
Specifying and implementing security policies using LaSCO, the language for security constraints on objects
JA Hoagland
University of California, Davis, 2000
462000
Port scanning techniques and the defense against them
R Christopher
October, 2001
452001
A uniform format for IPv6 extension headers
S Krishnan, J Woodyatt, E Kline, J Hoagland, M Bhatia
442012
Viewing ids alerts: Lessons from snortsnarf
JA Hoagland, S Staniford
Proceedings DARPA Information Survivability Conference and Exposition II …, 2001
312001
The Teredo protocol: Tunneling past network security and other security implications
J Hoagland
Symantec Response whitepaper, November, 2006
222006
Symantec internet security threat report: Trends for january-june 07
D Turner, S Entwisle, E Johnson, M Fossi, J Blackbird, D McKinney, ...
Technical report, Symantec Inc, 2007
212007
Audit Log Analysis Using the Visual Audit Browser Toolkit
J Hoagland, C Wee, K Levitt
Technical Report CSE-95-11, Department of Computer Science, University of …, 1995
211995
SPADE, Silicon Defense
J Hoagland, S Staniford
Nov 1, 1-4, 2000
202000
M. Bhatia," A Uniform Format for IPv6 Extension Headers
S Krishnan, J Woodyatt, E Kline, J Hoagland
RFC 6564, April, 2012
162012
Teredo security updates
D Thaler, S Krishnan, J Hoagland
132010
Specifying and enforcing policies using LaSCO: The language for security constraints on objects
JA Hoagland, R Pandey, KN Levitt
Department of Computer Science, University of California, Davis …, 1999
101999
Windows vista network attack surface analysis
J Hoagland, M Conover, T Newsham, O Whitehouse
Symantec Response whitepaper, 2007
62007
The Teredo Protocol: Tunneling Past Network Security and Other Security Implications, Symantec
J Hoagland
62007
Internet. Security
DSSDE EC, II ISN
5*2005
A graph-based language for specifying security policies
JA Hoagland, R Pandey, KN Levitt
citeseer. ist. psu. edu/144987. html, 0
4
RFC 5991: Teredo Security Updates
D Thaler, S Krishnan, J Hoagland
RFC Editor, 2010
12010
The system can't perform the operation now. Try again later.
Articles 1–20