Michael Bailey

Results: 183



#Item
41Internet Standards / Cyberwarfare / Internet protocols / Internet Protocol / Videotelephony / Denial-of-service attack / WHOIS / IPv6 / Computer emergency response team / United States Computer Emergency Readiness Team / IPv4 / Computer security

You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications Frank Li† Zakir Durumeric∗‡? Jakub Czyz∗ Mohammad Karami Michael Bailey‡ Damon McCoy. Stefan Savage◦ Vern Paxson†? of California

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2016-07-17 01:33:31
42

Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents Yang Liu§ , Armin Sarabi§ , Jing Zhang§ , Parinaz Naghizadeh§ Manish Karir] , Michael Bailey∗ , Mingyan Liu§,] §

Add to Reading List

Source URL: eecs.umich.edu

Language: English - Date: 2016-05-19 13:33:14
    43

      Measuring IPv6 Adoption    Jakub Czyz§, Mark Allman*, Jing Zhang§, Scott Iekel‐Johnson ⱡ,  Eric Osterweil ɣ, and Michael Bailey§ 

    Add to Reading List

    Source URL: web.engr.illinois.edu

    Language: English - Date: 2014-08-05 13:28:24
      44

      A Search Engine Backed by Internet-Wide Scanning Zakir Durumeric† David Adrian† Ariana Mirian† Michael Bailey‡ J. Alex Halderman† † University of Michigan ‡ University of Illinois, Urbana Champaign {zakir,

      Add to Reading List

      Source URL: web.engr.illinois.edu

      Language: English - Date: 2015-11-02 23:43:02
        45Computer hardware / Computing / Cybercrime / Computer storage devices / Non-volatile memory / USB flash drive / USB / Computer virus / AutoRun / Drive letter assignment / Social engineering / Personal computer

        1 Users Really Do Plug in USB Drives They Find Matthew Tischer† Zakir Durumeric‡† Sam Foster† Sunny Duan† Alec Mori† Elie Bursztein3 Michael Bailey† †

        Add to Reading List

        Source URL: zakird.com

        Language: English
        46

        Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy Jakub Czyz∗ , Matthew Luckie† , Mark Allman‡ , and Michael Bailey§ ∗ University of Michigan and QuadMetrics, Inc.; jczyz@

        Add to Reading List

        Source URL: web.engr.illinois.edu

        Language: English - Date: 2016-03-02 08:24:56
          47Clinical research ethics / Design of experiments / Drug safety / Institutional review board / IRB

          November 3, 2015 Michael Bailey Electrical & Computer Eng ECE 442 CSL

          Add to Reading List

          Source URL: mdbailey.ece.illinois.edu

          Language: English - Date: 2015-11-04 15:13:28
          48Computing / Internet / Network architecture / Internet security / Internet Standards / Port scanner / Transport Layer Security / Heartbleed / Database / IPv4

          A Search Engine Backed by Internet-Wide Scanning Zakir Durumeric† David Adrian† Ariana Mirian† Michael Bailey‡ J. Alex Halderman† † University of Michigan ‡ University of Illinois, Urbana Champaign {zakir,

          Add to Reading List

          Source URL: censys.io

          Language: English
          49

          Internet Background Radiation Revisited Eric Wustrow Manish Karir Michael Bailey

          Add to Reading List

          Source URL: web.engr.illinois.edu

          Language: English
            50

            Small is Better: Avoiding Latency Traps in Virtualized Data Centers Yunjing Xu, Michael Bailey, Brian Noble, Farnam Jahanian University of Michigan {yunjing, mibailey, bnoble, farnam}@umich.edu

            Add to Reading List

            Source URL: web.engr.illinois.edu

            Language: English - Date: 2014-08-05 13:28:23
              UPDATE