Guofei Gu
Guofei Gu
Professor, Department of Computer Science & Engineering, Texas A&M University
Email verificata su cse.tamu.edu - Home page
Titolo
Citata da
Citata da
Anno
Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
G Gu, R Perdisci, J Zhang, W Lee
13232008
BotSniffer: Detecting botnet command and control channels in network traffic
G Gu, J Zhang, W Lee
10272008
Bothunter: Detecting malware infection through ids-driven dialog correlation.
G Gu, PA Porras, V Yegneswaran, MW Fong, W Lee
USENIX Security Symposium 7, 1-16, 2007
10102007
FRESCO: Modular Composable Security Services for Software-Defined Networks
S Shin, P Porras, V Yegneswaran, M Fong, G Gu, M Tyson
20th Annual Network & Distributed System Security Symposium (NDSS'13), 2013
6632013
A security enforcement kernel for OpenFlow networks
P Porras, S Shin, V Yegneswaran, M Fong, M Tyson, G Gu
Proceedings of the first workshop on Hot topics in software defined networks …, 2012
6112012
Avant-guard: Scalable and vigilant switch flow management in software-defined networks
S Shin, V Yegneswaran, P Porras, G Gu
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
5262013
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
4122013
A taxonomy of botnet structures
D Dagon, G Gu, CP Lee, W Lee
Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third …, 2007
3362007
Vetting undesirable behaviors in android apps with permission use analysis
Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3352013
Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter
C Yang, R Harkreader, J Zhang, S Shin, G Gu
Proceedings of the 21st international conference on World Wide Web, 71-80, 2012
3022012
Attacking software-defined networks: A first feasibility study
S Shin, G Gu
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013
2962013
TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection
T Wang, T Wei, G Gu, W Zou
2010 IEEE Symposium on Security and Privacy, 497-512, 2010
2932010
Poisoning network visibility in software-defined networks: New attacks and countermeasures.
S Hong, L Xu, H Wang, G Gu
NDSS 15, 8-11, 2015
2912015
Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers
C Yang, RC Harkreader, G Gu
International Workshop on Recent Advances in Intrusion Detection, 318-337, 2011
2702011
Honeystat: Local worm detection using honeypots
D Dagon, X Qin, G Gu, W Lee, J Grizzard, J Levine, H Owen
International Workshop on Recent Advances in Intrusion Detection, 39-58, 2004
2702004
Smartdroid: an automatic system for revealing ui-based trigger conditions in android applications
C Zheng, S Zhu, S Dai, G Gu, X Gong, X Han, W Zou
Proceedings of the second ACM workshop on Security and privacy in …, 2012
2692012
Floodguard: A dos attack prevention extension in software-defined networks
H Wang, L Xu, G Gu
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
246*2015
Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems
R Perdisci, G Gu, W Lee
Sixth International Conference on Data Mining (ICDM'06), 488-498, 2006
2462006
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)
S Shin, G Gu
2012 20th IEEE international conference on network protocols (ICNP), 1-6, 2012
2372012
Comparison of open-source cloud management platforms: OpenStack and OpenNebula
X Wen, G Gu, Q Li, Y Gao, X Zhang
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery …, 2012
2312012
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20