Folgen
Guofei Gu
Guofei Gu
Professor, Department of Computer Science & Engineering, Texas A&M University
Bestätigte E-Mail-Adresse bei cse.tamu.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
G Gu, R Perdisci, J Zhang, W Lee
16612008
BotSniffer: Detecting botnet command and control channels in network traffic
G Gu, J Zhang, W Lee
12912008
Bothunter: Detecting malware infection through ids-driven dialog correlation.
G Gu, PA Porras, V Yegneswaran, MW Fong, W Lee
USENIX Security Symposium 7, 1-16, 2007
12132007
FRESCO: Modular Composable Security Services for Software-Defined Networks
S Shin, P Porras, V Yegneswaran, M Fong, G Gu, M Tyson
20th Annual Network & Distributed System Security Symposium (NDSS'13), 2013
9472013
Avant-guard: Scalable and vigilant switch flow management in software-defined networks
S Shin, V Yegneswaran, P Porras, G Gu
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
8412013
A security enforcement kernel for OpenFlow networks
P Porras, S Shin, V Yegneswaran, M Fong, M Tyson, G Gu
Proceedings of the first workshop on Hot topics in software defined networks …, 2012
8032012
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
5742013
TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection
T Wang, T Wei, G Gu, W Zou
2010 IEEE Symposium on Security and Privacy, 497-512, 2010
5582010
Poisoning network visibility in software-defined networks: New attacks and countermeasures.
S Hong, L Xu, H Wang, G Gu
Ndss 15, 8-11, 2015
5192015
Attacking software-defined networks: A first feasibility study
S Shin, G Gu
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013
4732013
Vetting undesirable behaviors in android apps with permission use analysis
Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
4602013
Empirical evaluation and new design for fighting evolving twitter spammers
C Yang, R Harkreader, G Gu
IEEE Transactions on Information Forensics and Security 8 (8), 1280-1293, 2013
4602013
Floodguard: A dos attack prevention extension in software-defined networks
H Wang, L Xu, G Gu
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
4462015
Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter
C Yang, R Harkreader, J Zhang, S Shin, G Gu
Proceedings of the 21st international conference on World Wide Web, 71-80, 2012
4392012
A taxonomy of botnet structures
D Dagon, G Gu, CP Lee, W Lee
Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third …, 2007
4002007
METHOD AND APPARATUS FOR DETECTING MALWARE INFECTION
G Gu, PA Porras, M Fong
US Patent App. 20,090/172,815, 2008
394*2008
Smartdroid: an automatic system for revealing ui-based trigger conditions in android applications
C Zheng, S Zhu, S Dai, G Gu, X Gong, X Han, W Zou
Proceedings of the second ACM workshop on Security and privacy in …, 2012
3692012
Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers
C Yang, RC Harkreader, G Gu
Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011
3652011
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)
S Shin, G Gu
2012 20th IEEE international conference on network protocols (ICNP), 1-6, 2012
3282012
Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems
R Perdisci, G Gu, W Lee
Sixth International Conference on Data Mining (ICDM'06), 488-498, 2006
3272006
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20