Practical automated detection of stealthy portscans S Staniford, JA Hoagland, JM McAlerney Journal of Computer Security 10 (1-2), 105-136, 2002 | 789 | 2002 |
GrIDS-a graph based intrusion detection system for large networks S Staniford-Chen, S Cheung, R Crawford, M Dilger, J Frank, J Hoagland, ... Proceedings of the 19th national information systems security conference 1 …, 1996 | 764 | 1996 |
Security policy specification using a graphical approach JA Hoagland, R Pandey, KN Levitt arXiv preprint cs/9809124, 1998 | 109 | 1998 |
Port scanning techniques and the defense against them R Christopher October, 2001 | 53 | 2001 |
Security concerns with IP tunneling S Krishnan, D Thaler, J Hoagland | 48 | 2011 |
Specifying and implementing security policies using LaSCO, the language for security constraints on objects JA Hoagland University of California, Davis, 2000 | 47 | 2000 |
A uniform format for IPv6 extension headers S Krishnan, J Woodyatt, E Kline, J Hoagland, M Bhatia | 44 | 2012 |
Viewing ids alerts: Lessons from snortsnarf JA Hoagland, S Staniford Proceedings DARPA Information Survivability Conference and Exposition II …, 2001 | 31 | 2001 |
The Teredo protocol: Tunneling past network security and other security implications J Hoagland Symantec Response whitepaper, November, 2006 | 23 | 2006 |
Symantec internet security threat report: Trends for january-june 07 D Turner, S Entwisle, E Johnson, M Fossi, J Blackbird, D McKinney, ... Technical report, Symantec Inc, 2007 | 21 | 2007 |
Audit Log Analysis Using the Visual Audit Browser Toolkit J Hoagland, C Wee, K Levitt Technical Report CSE-95-11, Department of Computer Science, University of …, 1995 | 21 | 1995 |
SPADE, Silicon Defense J Hoagland, S Staniford Nov 1, 1-4, 2000 | 20 | 2000 |
M. Bhatia," A Uniform Format for IPv6 Extension Headers S Krishnan, J Woodyatt, E Kline, J Hoagland RFC 6564, April, 2012 | 16 | 2012 |
Teredo security updates D Thaler, S Krishnan, J Hoagland | 13 | 2010 |
Specifying and enforcing policies using LaSCO: The language for security constraints on objects JA Hoagland, R Pandey, KN Levitt Department of Computer Science, University of California, Davis …, 1999 | 10 | 1999 |
Windows vista network attack surface analysis J Hoagland, M Conover, T Newsham, O Whitehouse Symantec Response whitepaper, 2007 | 6 | 2007 |
The Teredo Protocol: Tunneling Past Network Security and Other Security Implications, Symantec J Hoagland | 6 | 2007 |
Internet. Security DSSDE EC, II ISN | 5* | 2005 |
A graph-based language for specifying security policies JA Hoagland, R Pandey, KN Levitt citeseer. ist. psu. edu/144987. html, 0 | 4 | |
RFC 5991: Teredo Security Updates D Thaler, S Krishnan, J Hoagland RFC Editor, 2010 | 1 | 2010 |