Monrose

Results: 68



#Item
31Internet / Computer worms / Code Red / Malware / Witty / Subnetwork / Morris worm / Classless Inter-Domain Routing / Intrusion detection system / Network architecture / Routing / Computing

On the Effectiveness of Distributed Worm Monitoring Moheeb Abu Rajab Fabian Monrose Andreas Terzis

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2005-09-11 12:46:40
32Code Red / Computer virus / Witty / Morris worm / Malware / SQL Slammer / Parasitic worm / Ice / Failure / Computer worms / Cyberwarfare / Computer security

Worm Evolution Tracking via Timing Analysis Moheeb Abu Rajab Fabian Monrose Andreas Terzis Computer Science Department Johns Hopkins University {moheeb,fabian,terzis}@cs.jhu.edu

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2005-12-24 13:57:41
33Computer network security / Malware / Network address translation / Private network / IP address / Code Red / Botnet / Witty / Computer worms / System software / Network architecture / Computing

On the Impact of Dynamic Addressing on Malware Propagation Moheeb Abu Rajab Fabian Monrose Andreas Terzis Computer Science Department Johns Hopkins University {moheeb,fabian,terzis}@cs.jhu.edu

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2006-09-25 13:27:50
34Windows Server / Cypherpunks / Niels Provos / Year of birth missing / Hyper-V / Hypervisor / Data center / Monrose / Router / System software / Computing / Software

Srinivas Krishnan 105 Fidelity St, Apt A50, Carrboro NC[removed]Phone: [removed]E-Mail: [removed] Interests Large-scale network systems, Virtualization Security, Data and Performance analysis, Security analys

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2011-08-17 21:51:44
35Shin Megami Tensei: Persona / HTTP cookie / P3P / User / Proxy server / Computing / Internet privacy / Internet

Privacy-Preserving Global Customization (Extended Abstract) Robert M. Arlein Ben Jai Markus Jakobsson Fabian Monrose Michael K. Reiter Information Sciences Research Center Bell Labs, Lucent Technologies Murray Hill, NJ,

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:34
36Handwriting recognition / Art forgery / Password / Biometrics / Pen computing / Authentication / Security / Cryptography / Passphrase

Evaluating the Security of Handwriting Biometrics Lucas Ballard Daniel Lopresti Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:47
37Computer vision / User interface techniques / Computer keyboard / Homography / Inter frame / IPhone / Frame rate / Speech recognition / Keyboard layout / Geometry / Human–computer interaction / Computing

iSpy: Automatic Reconstruction of Typed Input from Compromising Reflections Rahul Raguram, Andrew M. White, Dibenyendu Goswami, Fabian Monrose and Jan-Michael Frahm Department of Computer Science, University of North Ca

Add to Reading List

Source URL: www.cs.unc.edu

Language: English - Date: 2011-08-30 21:32:09
38Internet standards / Routing / ASCII art / Classless Inter-Domain Routing / IP address / Sampling / Border Gateway Protocol / Network telescope / Network architecture / Internet / Computing

Fast and Evasive Attacks: Highlighting the challenges ahead Moheeb Abu Rajab Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:33
39Carboxylic acids / Pyrrolidines / Organofluorides / Cyclopropanes / Eve of Destruction / Chemistry / Organic chemistry / Alcohols

Distillation Codes and DOS Resistant Multicast Moderation Prepared for CS 624 – Fabian Monrose Johns Hopkins University Kevin Snow & Ryan Gardner

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:20
40Xen / Hardware virtualization / Hypervisor / Hyper-V / Virtualization / Rootkit / Page table / Kernel / OpenVZ / System software / Software / Virtual machines

Trail of Bytes: Efficient Support for Forensic Analysis Srinivas Krishnan Kevin Snow Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2011-04-18 21:55:17
UPDATE