How to own the internet in your spare time S Staniford, V Paxson, N Weaver 11th USENIX Security Symposium (USENIX Security 02), 2002 | 1780 | 2002 |
Inside the slammer worm D Moore, V Paxson, S Savage, C Shannon, S Staniford, N Weaver IEEE Security & Privacy 1 (4), 33-39, 2003 | 1483 | 2003 |
Practical automated detection of stealthy portscans S Staniford, JA Hoagland, JM McAlerney Journal of Computer Security 10 (1-2), 105-136, 2002 | 787 | 2002 |
A taxonomy of computer worms N Weaver, V Paxson, S Staniford, R Cunningham Proceedings of the 2003 ACM workshop on Rapid Malcode, 11-18, 2003 | 768 | 2003 |
GrIDS-a graph based intrusion detection system for large networks S Staniford-Chen, S Cheung, R Crawford, M Dilger, J Frank, J Hoagland, ... Proceedings of the 19th national information systems security conference 1 …, 1996 | 765 | 1996 |
Systems and methods for detecting malicious network content SG Staniford, A Aziz US Patent 8,850,571, 2014 | 534 | 2014 |
Holding intruders accountable on the internet S Staniford-Chen, LT Heberlein Proceedings 1995 IEEE Symposium on Security and Privacy, 39-49, 1995 | 449 | 1995 |
Electronic message analysis for malware detection A Aziz, H Uyeno, J Manni, M Amin, S Staniford US Patent 9,106,694, 2015 | 437 | 2015 |
Very fast containment of scanning worms, revisited N Weaver, S Staniford, V Paxson Malware Detection, 113-145, 2007 | 394 | 2007 |
Method and system for reducing the rate of infection of a communications network by a software worm S Staniford, C Kahn, N Weaver, C Coit, R Jonkman US Patent App. 10/313,623, 2004 | 360 | 2004 |
Systems and methods for detecting malicious PDF network content SG Staniford, A Aziz US Patent 8,997,219, 2015 | 355 | 2015 |
Towards faster string matching for intrusion detection or exceeding the speed of snort CJ Coit, S Staniford, J McAlerney Proceedings DARPA Information Survivability Conference and Exposition II …, 2001 | 344 | 2001 |
Detecting malicious network content A Aziz, SG Staniford, M Amin, H Uyeno, S Yie US Patent 9,519,782, 2016 | 343 | 2016 |
Systems and methods for scheduling analysis of network content for malware SG Staniford, A Aziz US Patent 8,990,939, 2015 | 317 | 2015 |
Systems and methods for detecting malicious PDF network content SG Staniford, A Aziz US Patent 9,118,715, 2015 | 304 | 2015 |
The top speed of flash worms S Staniford, D Moore, V Paxson, N Weaver Proceedings of the 2004 ACM workshop on Rapid malcode, 33-42, 2004 | 302 | 2004 |
Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay DL Donoho, AG Flesia, U Shankar, V Paxson, J Coit, S Staniford Recent Advances in Intrusion Detection: 5th International Symposium, RAID …, 2002 | 287 | 2002 |
Denial of service and other resource exhaustion defense and mitigation using transition tracking S Staniford US Patent App. 14/974,025, 2016 | 208 | 2016 |
Electronic message analysis for malware detection A Aziz, H Uyeno, J Manni, A Sukhera, S Staniford US Patent 10,027,690, 2018 | 194 | 2018 |
Systems and Methods for Scheduling Analysis of Network Content for Malware SG Staniford, A Aziz US Patent App. 14/620,101, 2015 | 185 | 2015 |