Constructing attack scenarios through correlation of intrusion alerts P Ning, Y Cui, DS Reeves Proceedings of the 9th ACM Conference on Computer and Communications …, 2002 | 863 | 2002 |
Evaluation of multicast routing algorithms for real-time communication on high-speed networks HF Salama, DS Reeves, Y Viniotis IEEE Journal on Selected Areas in Communications 15 (3), 332-345, 1997 | 583 | 1997 |
Real-time communication in packet-switched networks CM Aras, JF Kurose, DS Reeves, H Schulzrinne Proceedings of the IEEE 82 (1), 122-139, 1994 | 446 | 1994 |
Techniques and tools for analyzing intrusion alerts P Ning, Y Cui, DS Reeves, D Xu ACM Transactions on Information and System Security (TISSEC) 7 (2), 274-318, 2004 | 430 | 2004 |
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays X Wang, DS Reeves Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 365 | 2003 |
Fast malware classification by automated behavioral graph matching Y Park, D Reeves, V Mulukutla, B Sundaravel Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010 | 274 | 2010 |
Analyzing intensive intrusion alerts via correlation P Ning, Y Cui, DS Reeves Recent Advances in Intrusion Detection: 5th International Symposium, RAID …, 2002 | 263 | 2002 |
A distributed algorithm for delay-constrained unicast routing HF Salama, DS Reeves, Y Viniotis Proceedings of INFOCOM'97 1, 84-91, 1997 | 256 | 1997 |
Inter-packet delay based correlation for tracing encrypted connections through stepping stones X Wang, DS Reeves, SF Wu Computer Security—ESORICS 2002: 7th European Symposium on Research in …, 2002 | 231 | 2002 |
Sleepy watermark tracing: An active network-based intrusion response framework X Wang, DS Reeves, SF Wu, J Yuill Trusted Information: The New Decade Challenge 16, 369-384, 2001 | 230 | 2001 |
A distributed algorithm for delay-constrained unicast routing DS Reeves, HF Salama IEEE/ACM Transactions on networking 8 (2), 239-250, 2000 | 228 | 2000 |
On the secrecy of timing-based active watermarking trace-back techniques P Peng, P Ning, DS Reeves 2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-349, 2006 | 203 | 2006 |
Metaaware: Identifying metamorphic malware Q Zhang, DS Reeves Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007 | 200 | 2007 |
Defending against sybil attacks in sensor networks Q Zhang, P Wang, DS Reeves, P Ning 25th ieee international conference on distributed computing systems …, 2005 | 191 | 2005 |
Tracing traffic through intermediate hosts that repacketize flows YJ Pyun, YH Park, X Wang, DS Reeves, P Ning IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 160 | 2007 |
Deriving common malware behavior through graph clustering Y Park, D Reeves Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 159 | 2011 |
A survey of statistical source models for variable-bit-rate compressed video MR Izquierdo, DS Reeves Multimedia systems 7, 199-213, 1999 | 116 | 1999 |
Self-stabilizing structured ring topology p2p systems A Shaker, DS Reeves Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05), 39-46, 2005 | 104 | 2005 |
Analyzing network traffic to detect self-decrypting exploit code Q Zhang, DS Reeves, P Ning, SP Iyer Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 98 | 2007 |
The delay-constrained minimum spanning tree problem HF Salama, DS Reeves, Y Viniotis Proceedings Second IEEE Symposium on Computer and Communications, 699-703, 1997 | 96 | 1997 |