Monrose

Results: 68



#Item
21Xen / Hardware virtualization / Hypervisor / Hyper-V / Virtualization / Rootkit / Page table / Kernel / OpenVZ / System software / Software / Virtual machines

Trail of Bytes: Efficient Support for Forensic Analysis Srinivas Krishnan Kevin Snow Fabian Monrose

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2014-09-05 15:38:44
22

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-04-05 19:56:58
    23

    2011 IEEE Symposium on Security and Privacy Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iks Andrew M. White∗ Austin R. Matthews∗† Kevin Z. Snow∗ Fabian Monrose∗

    Add to Reading List

    Source URL: ieee-security.org

    Language: English - Date: 2011-04-10 18:06:48
      24

      The Challenges of Effectively Anonymizing Network Data Scott E. Coull∗ ∗ Fabian Monrose†

      Add to Reading List

      Source URL: web.engr.illinois.edu

      Language: English - Date: 2014-08-05 13:28:17
        25

        A Multifaceted Approach to Understanding the Botnet Phenomenon Moheeb Abu Rajab Jay Zarfoss Fabian Monrose Computer Science Department

        Add to Reading List

        Source URL: www.cs.jhu.edu

        Language: English - Date: 2006-09-07 23:05:21
          26Routing / Internet standards / Internet protocols / Border Gateway Protocol / Multihoming / Classless Inter-Domain Routing / IP address / Default-free zone / Router / Network architecture / Internet / Computing

          Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing Sophie Y. Qiu, Patrick D. McDaniel∗ , Fabian Monrose, and Aviel D. Rubin Department of Computer Science ∗ Department

          Add to Reading List

          Source URL: nsrc.cse.psu.edu

          Language: English - Date: 2015-04-11 00:49:57
          27Data / Deep packet inspection / Sliding window protocol / Snort / IPv4 / Network packet / Packet Processing / Packet loss / Transmission Control Protocol / Computing / Computer network security / Information

          Clear and Present Data: Opaque Traffic and its Security Implications for the Future Andrew M. White∗ , Srinivas Krishnan∗ , Michael Bailey† , Fabian Monrose∗ , Phillip Porras‡ ∗ University of North Carolina a

          Add to Reading List

          Source URL: mdbailey.ece.illinois.edu

          Language: English - Date: 2014-08-05 13:28:22
          28Privacy / Statistics / Security / Data privacy / Data protection / Synthetic data / Microdata / Pseudonymization / FLAIM / Ethics / Identity management / Social issues

          The Challenges of Effectively Anonymizing Network Data Scott E. Coull∗ ∗ Fabian Monrose†

          Add to Reading List

          Source URL: mdbailey.ece.illinois.edu

          Language: English - Date: 2014-08-05 13:28:17
          29Internet standards / Routing / ASCII art / Classless Inter-Domain Routing / IP address / Sampling / Border Gateway Protocol / Network telescope / Network architecture / Internet / Computing

          Fast and Evasive Attacks: Highlighting the challenges ahead Moheeb Abu Rajab Fabian Monrose

          Add to Reading List

          Source URL: www.cs.jhu.edu

          Language: English - Date: 2006-09-25 13:27:22
          UPDATE