Michael Donald Bailey
Michael Donald Bailey
Email verificata su illinois.edu - Home page
TitoloCitata daAnno
Automated classification and analysis of internet malware
M Bailey, J Oberheide, J Andersen, ZM Mao, F Jahanian, J Nazario
International Workshop on Recent Advances in Intrusion Detection, 178-197, 2007
6452007
The matter of heartbleed
Z Durumeric, F Li, J Kasten, J Amann, J Beekman, M Payer, N Weaver, ...
Proceedings of the 2014 conference on internet measurement conference, 475-488, 2014
4802014
Understanding the Mirai Botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
3712017
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
X Chen, J Andersen, ZM Mao, M Bailey, J Nazario
2008 IEEE International Conference on Dependable Systems & Networks With …, 2008
3422008
The Internet Motion Sensor-A Distributed Blackhole Monitoring System.
M Bailey, E Cooke, F Jahanian, J Nazario, D Watson
NDSS, 2005
3412005
A survey of botnet technology and defenses
M Bailey, E Cooke, F Jahanian, Y Xu, M Karir
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
2622009
Analysis of the HTTPS certificate ecosystem
Z Durumeric, J Kasten, M Bailey, JA Halderman
Proceedings of the 2013 conference on Internet measurement conference, 291-304, 2013
2362013
An exploration of L2 cache covert channels in virtualized environments
Y Xu, M Bailey, F Jahanian, K Joshi, M Hiltunen, R Schlichting
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 29-40, 2011
2342011
A search engine backed by Internet-wide scanning
Z Durumeric, D Adrian, A Mirian, M Bailey, JA Halderman
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2012015
Bobtail: Avoiding Long Tails in the Cloud.
Y Xu, Z Musgrave, B Noble, M Bailey
NSDI 13, 329-342, 2013
1972013
Toward understanding distributed blackhole placement
E Cooke, M Bailey, ZM Mao, D Watson, F Jahanian, D McPherson
Proceedings of the 2004 ACM workshop on Rapid malcode, 54-64, 2004
1622004
Bohatei: Flexible and Elastic DDoS Defense.
SK Fayaz, Y Tobioka, V Sekar, M Bailey
USENIX Security Symposium, 817-832, 2015
1612015
The blaster worm: Then and now
M Bailey, E Cooke, F Jahanian, D Watson
IEEE Security & Privacy 3 (4), 26-31, 2005
1602005
The menlo report: Ethical principles guiding information and communication technology research
M Bailey, D Dittrich, E Kenneally, D Maughan
Department of Homeland Security, 2012
141*2012
Measuring ipv6 adoption
J Czyz, M Allman, J Zhang, S Iekel-Johnson, E Osterweil, M Bailey
Proceedings of the 2015 ACM SIGCOMM Conference, 2015
1322015
Internet background radiation revisited
E Wustrow, M Karir, M Bailey, F Jahanian, G Huston
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 62-74, 2010
1322010
Shades of Grey: On the effectiveness of reputation-based “blacklists”
S Sinha, M Bailey, F Jahanian
2008 3rd International Conference on Malicious and Unwanted Software …, 2008
1222008
Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks
J Czyz, M Kallitsis, M Gharaibeh, C Papadopoulos, M Bailey, M Karir
Proceedings of the 2014 Conference on Internet Measurement Conference, 435-448, 2014
1192014
An Internet-Wide View of Internet-Wide Scanning.
Z Durumeric, M Bailey, JA Halderman
USENIX Security Symposium, 65-78, 2014
982014
Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents.
Y Liu, A Sarabi, J Zhang, P Naghizadeh, M Karir, M Bailey, M Liu
USENIX Security Symposium, 1009-1024, 2015
932015
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20