Internet denial of service: attack and defense mechanisms (Radia Perlman Computer Networking and Security) J Mirkovic, S Dietrich, D Dittrich, P Reiher Prentice Hall PTR, 2004 | 606 | 2004 |
Analyzing distributed denial of service tools: The shaft case S Dietrich, N Long 14th Systems Administration Conference (LISA 2000), 2000 | 249 | 2000 |
Analysis of the Storm and Nugache Trojans: P2P is here S Stover, D Dittrich, J Hernandez, S Dietrich USENIX; login 32 (6), 18-27, 2007 | 186 | 2007 |
P2P as botnet command and control: a deeper insight D Dittrich, S Dietrich 2008 3rd International Conference on Malicious and Unwanted Software …, 2008 | 169 | 2008 |
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts B Coskun, S Dietrich, N Memon Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 126 | 2010 |
Security challenges and opportunities of software-defined networking MC Dacier, H König, R Cwalinski, F Kargl, S Dietrich IEEE Security & Privacy 15 (2), 96-100, 2017 | 114 | 2017 |
The mstream distributed denial of service attack tool D Dittrich, G Weaver, S Dietrich, N Long University of Washington, http://staff. washington. edu/dittrich/misc …, 2000 | 91* | 2000 |
Detecting zero-day attacks using context-aware anomaly detection at the application-layer P Duessel, C Gehl, U Flegel, S Dietrich, M Meier International Journal of Information Security 16 (5), 475-490, 2017 | 76 | 2017 |
{SkyNET}: A {3G-Enabled} Mobile Attack Drone and Stealth Botmaster T Reed, J Geis, S Dietrich 5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011 | 55 | 2011 |
Re-evaluating the wisdom of crowds in assessing web security PH Chia, SJ Knapskog Financial Cryptography and Data Security: 15th International Conference, FC …, 2012 | 40* | 2012 |
Building an active computer security ethics community D Dittrich, M Bailey, S Dietrich IEEE Security & Privacy 9 (4), 32-40, 2010 | 38 | 2010 |
Discovery techniques for P2P botnets D Dittrich, S Dietrich Stevens Institute of Technology CS Technical Report 4 (26), 2, 2008 | 37 | 2008 |
Towards community standards for ethical behavior in computer security research D Dittrich, M Bailey, S Dietrich University of Washington, Michael Bailey, University of Michigan, Sven …, 2009 | 32 | 2009 |
An Analysis of the” shaft” distributed denial of service tool S Dietrich, N Long, D Dittrich Proceedings of LISA 2000, 2000 | 32 | 2000 |
Command and control structures in malware D Dittrich, S Dietrich Usenix magazine 32 (6), 2007 | 19 | 2007 |
{V0Finder}: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities S Woo, D Lee, S Park, H Lee, S Dietrich 30th USENIX Security Symposium (USENIX Security 21), 3041-3058, 2021 | 17 | 2021 |
New directions in peer-to-peer malware D Dittrich, S Dietrich 2008 IEEE Sarnoff Symposium, 1-5, 2008 | 17 | 2008 |
Financial Cryptography and Data Security: FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers R Sion, R Curtmola, S Dietrich, A Kiayias, JM Miret, K Sako, F Sebé Springer Science & Business Media, 2010 | 16* | 2010 |
A formal analysis of the secure sockets layer protocol S Dietrich PhDthesis, Dept. Mathematics andComputerScience, Adelphi University, April1997, 1997 | 16 | 1997 |
A secure submission system for online whistleblowing platforms V Roth, B Güldenring, E Rieffel, S Dietrich, L Ries Financial Cryptography and Data Security: 17th International Conference, FC …, 2013 | 15 | 2013 |