Anton Chuvakin

According to our database1, Anton Chuvakin authored at least 14 papers between 2002 and 2011.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Honeypots and Honeynets.
Proceedings of the Encyclopedia of Information Assurance, 2011

Covert Channels.
Proceedings of the Encyclopedia of Information Assurance, 2011

2010
How to Do Application Logging Right.
IEEE Secur. Priv., 2010

2009
Logging in the Age of Web Services.
IEEE Secur. Priv., 2009

2007
Honeypot Essentials.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Covert Channels.
Proceedings of the Information security management handbook, Sixth Edition., 2007

2004
Ed Skoudis (with Larry Zeitser) - Malware: Fighting Malicious Code.
login Usenix Mag., 2004

Kevin Mandia, Chris Prosise - Incident Response: Computer Forensics, 2nd Ed.
login Usenix Mag., 2004

Security Event Analysis through Correlation.
Inf. Secur. J. A Glob. Perspect., 2004

Monitoring IDS.
Inf. Secur. J. A Glob. Perspect., 2004

Security warrior - know your enemy.
O'Reilly, ISBN: 978-0-596-00545-0, 2004

2003
Ups and Downs of UNIX/Linux Host-Based Security Solutions.
login Usenix Mag., 2003

Honeypot Essentials.
Inf. Secur. J. A Glob. Perspect., 2003

2002
Incident Response, and of Lance Spitzner: Honeypots: Tracking Hackers, reviewed by Eugene Schultz and Russell Shumway.
login Usenix Mag., 2002


  Loading...