How to Own the Internet in Your Spare Time. S Staniford, V Paxson, N Weaver USENIX security symposium 2, 14-15, 2002 | 1677 | 2002 |
Inside the slammer worm D Moore, V Paxson, S Savage, C Shannon, S Staniford, N Weaver IEEE Security & Privacy 1 (4), 33-39, 2003 | 1357 | 2003 |
Practical automated detection of stealthy portscans S Staniford, JA Hoagland, JM McAlerney Journal of Computer Security 10 (1-2), 105-136, 2002 | 716 | 2002 |
GrIDS-a graph based intrusion detection system for large networks S Staniford-Chen, S Cheung, R Crawford, M Dilger, J Frank, J Hoagland, ... Proceedings of the 19th national information systems security conference 1 …, 1996 | 695 | 1996 |
A taxonomy of computer worms N Weaver, V Paxson, S Staniford, R Cunningham Proceedings of the 2003 ACM workshop on Rapid malcode, 11-18, 2003 | 689 | 2003 |
Holding intruders accountable on the internet S Staniford-Chen, LT Heberlein Proceedings 1995 IEEE Symposium on Security and Privacy, 39-49, 1995 | 410 | 1995 |
Very Fast Containment of Scanning Worms. N Weaver, S Staniford, V Paxson USENIX Security Symposium 2, 16-85, 2004 | 370 | 2004 |
Systems and methods for detecting malicious network content SG Staniford, A Aziz US Patent 8,850,571, 2014 | 347 | 2014 |
Towards faster string matching for intrusion detection or exceeding the speed of snort CJ Coit, S Staniford, J McAlerney Proceedings DARPA Information Survivability Conference and Exposition II …, 2001 | 330 | 2001 |
Electronic message analysis for malware detection A Aziz, H Uyeno, J Manni, M Amin, S Staniford US Patent 9,106,694, 2015 | 324 | 2015 |
The spread of the sapphire/slammer worm D Moore, V Paxson, S Savage, C Shannon, S Staniford, N Weaver CAIDA, ICSI, Silicon Defense, UC Berkeley EECS and UC San Diego CSE, 2003 | 315 | 2003 |
Method and system for reducing the rate of infection of a communications network by a software worm S Staniford, C Kahn, N Weaver, C Coit, R Jonkman US Patent App. 10/313,623, 2004 | 294 | 2004 |
The top speed of flash worms S Staniford, D Moore, V Paxson, N Weaver Proceedings of the 2004 ACM workshop on Rapid malcode, 33-42, 2004 | 276 | 2004 |
Systems and methods for detecting malicious PDF network content SG Staniford, A Aziz US Patent 8,997,219, 2015 | 265 | 2015 |
Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay DL Donoho, AG Flesia, U Shankar, V Paxson, J Coit, S Staniford International Workshop on Recent Advances in Intrusion Detection, 17-35, 2002 | 262 | 2002 |
Detecting malicious network content A Aziz, SG Staniford, M Amin, H Uyeno, S Yie US Patent 9,519,782, 2016 | 244 | 2016 |
Systems and methods for scheduling analysis of network content for malware SG Staniford, A Aziz US Patent 8,990,939, 2015 | 233 | 2015 |
Systems and methods for detecting malicious PDF network content SG Staniford, A Aziz US Patent 9,118,715, 2015 | 225 | 2015 |
Containment of scanning worms in enterprise networks S Staniford Journal of Computer Security, 2004 | 145 | 2004 |
Electronic message analysis for malware detection A Aziz, H Uyeno, J Manni, A Sukhera, S Staniford US Patent 10,027,690, 2018 | 133* | 2018 |