John G. Levine

According to our database1, John G. Levine authored at least 9 papers between 2003 and 2006.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2006
Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection.
IEEE Secur. Priv., 2006

2004
A Methodology for Detecting and Classifying Rootkit Exploits.
PhD thesis, 2004

Using Honeynets to Protect Large Enterprise Networks.
IEEE Secur. Priv., 2004

HoneyStat: Local Worm Detection Using Honeypots.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), 2004

Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table.
Proceedings of the Computer Security, 2004

2003
Intrusion Detection Testing and Benchmarking Methodologies.
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), 2003

Wireless Intrusion Detection and Response.
Proceedings of the IEEE Systems, 2003

The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks.
Proceedings of the IEEE Systems, 2003


  Loading...