John G. Levine
According to our database1,
John G. Levine
authored at least 9 papers
between 2003 and 2006.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2006
IEEE Secur. Priv., 2006
2004
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), 2004
Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table.
Proceedings of the Computer Security, 2004
2003
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), 2003
Wireless Intrusion Detection and Response.
Proceedings of the IEEE Systems, 2003
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks.
Proceedings of the IEEE Systems, 2003