Michael Bailey

Results: 183



#Item
61Cryptography / Public-key cryptography / Key management / Transport Layer Security / Public key infrastructure / Certificate authority / Root certificate / Public key certificate / HTTPS / DigiNotar

Analysis of the HTTPS Certificate Ecosystem Zakir Durumeric, James Kasten, Michael Bailey, J. Alex Halderman University of Michigan

Add to Reading List

Source URL: zakird.com

Language: English
62Ecological theories / Predation / Biological pest control / Parasitism / Parasitoid / Theoretical ecology / Michael Hassell / Optimal foraging theory / Nicholson–Bailey model / Biology / Ecology / Parasitology

100 INFLUENTIAL PAPERS – LONGER COMMENTARY 13 Hassell, M. P. & May, R. MStability in insect host-parasite models. Journal of Animal Ecology, 42, .

Add to Reading List

Source URL: www.britishecologicalsociety.org

Language: English - Date: 2014-02-17 05:45:48
63

On the Mismanagement and Maliciousness of Networks Jing Zhang† , Zakir Durumeric† , Michael Bailey† , Mingyan Liu† , and Manish Karir‡ † Computer Science and Engineering

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2014-03-03 23:21:01
    64

    Towards Community Standards for Ethical Behavior in Computer Security Research David Dittrich University of Washington Michael Bailey

    Add to Reading List

    Source URL: web.engr.illinois.edu

    - Date: 2014-08-05 13:28:18
      65

      An Exploration of L2 Cache Covert Channels in Virtualized Environments Kaustubh Joshi, Matti Hiltunen, Richard Schlichting Yunjing Xu, Michael Bailey,

      Add to Reading List

      Source URL: web.engr.illinois.edu

      - Date: 2014-08-05 13:28:17
        66

        Censorship and Co-option of the Internet Infrastructure Michael Bailey Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI 48109

        Add to Reading List

        Source URL: web.engr.illinois.edu

        - Date: 2014-08-05 13:28:18
          67

          A Survey of Botnet Technology and Defenses Michael Bailey, Evan Cooke, Farnam Jahanian, Yunjing Xu University of Michigan Ann Arbor, Michigan {mibailey, emcooke, farnam, yunjing}@umich.edu

          Add to Reading List

          Source URL: web.engr.illinois.edu

          Language: English - Date: 2014-08-05 13:28:17
            68

            Cybersecurity Applications & Technology Conference For Homeland Security A Survey of Botnet Technology and Defenses Michael Bailey, Evan Cooke, Farnam Jahanian, Yunjing Xu University of Michigan Ann Arbor, Michigan

            Add to Reading List

            Source URL: grothoff.org

            Language: English - Date: 2014-01-15 05:28:55
              69

              Curriculum Vitae Michael Donald Bailey Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign 406 Coordinated Science Laboratory 1308 W Main Street

              Add to Reading List

              Source URL: web.engr.illinois.edu

              Language: English - Date: 2015-03-17 19:23:51
                70

                Understanding IPv6 Internet Background Radiation Jakub Czyz, Kyle Lady, Sam G. Miller, Michael Bailey University of Michigan Ann Arbor, MI

                Add to Reading List

                Source URL: web.engr.illinois.edu

                Language: English - Date: 2014-08-05 13:28:20
                  UPDATE