Internet denial of service: attack and defense mechanisms (Radia Perlman Computer Networking and Security) J Mirkovic, S Dietrich, D Dittrich, P Reiher Prentice Hall PTR, 2004 | 579 | 2004 |
The Menlo Report: Ethical principles guiding information and communication technology research D Dittrich, E Kenneally US Department of Homeland Security, 2012 | 306 | 2012 |
The DoS Project’s ‘trinoo’distributed denial of service attack tool D Dittrich University of Washington 10, 1999 | 241 | 1999 |
Analyzing distributed denial of service tools: The shaft case S Dietrich, N Long 14th Systems Administration Conference (LISA 2000), 2000 | 239 | 2000 |
Analysis of the Storm and Nugache Trojans: P2P is here S Stover, D Dittrich, J Hernandez, S Dietrich USENIX; login 32 (6), 18-27, 2007 | 185 | 2007 |
The menlo report M Bailey, D Dittrich, E Kenneally, D Maughan IEEE Security & Privacy 10 (2), 71-75, 2012 | 167 | 2012 |
P2P as botnet command and control: a deeper insight D Dittrich, S Dietrich 2008 3rd International Conference on Malicious and Unwanted Software …, 2008 | 167 | 2008 |
The ‘stacheldraht’distributed denial of service attack tool D Dittrich Dec, 1999 | 142 | 1999 |
The menlo report: Ethical principles guiding information and communication technology research E Kenneally, D Dittrich Available at SSRN 2445102, 2012 | 93 | 2012 |
The mstream distributed denial of service attack tool D Dittrich, G Weaver, S Dietrich, N Long University of Washington, http://staff. washington. edu/dittrich/misc …, 2000 | 73 | 2000 |
Distributed Denial of Service (DDoS) Attacks/tool D Dittrich http://staff. washington. edu/dittrich/misc/ddos/, 2005 | 71 | 2005 |
So You Want to Take Over a Botnet... D Dittrich 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12), 2012 | 60 | 2012 |
Computer science security research and human subjects: Emerging considerations for research ethics boards E Buchanan, J Aycock, S Dexter, D Dittrich, E Hvizdak Journal of Empirical Research on Human Research Ethics 6 (2), 71-83, 2011 | 59 | 2011 |
Creating realistic corpora for security and forensic education K Woods, CA Lee, S Garfinkel, D Dittrich, A Russell, K Kearton | 56 | 2011 |
Distributed denial of service attacks: defenses J Jones, DF Cohen, D Dittrich, C Huegen Global Integrity Corporation, 1-14, 2000 | 51 | 2000 |
Building an active computer security ethics community D Dittrich, M Bailey, S Dietrich IEEE Security & Privacy 9 (4), 32-40, 2010 | 38 | 2010 |
Discovery techniques for P2P botnets D Dittrich, S Dietrich Stevens Institute of Technology CS Technical Report 4 (26), 2, 2008 | 37 | 2008 |
Towards community standards for ethical behavior in computer security research D Dittrich, M Bailey, S Dietrich University of Washington, Michael Bailey, University of Michigan, Sven …, 2009 | 32 | 2009 |
An Analysis of the” shaft” distributed denial of service tool S Dietrich, N Long, D Dittrich Proceedings of LISA 2000, 2000 | 32 | 2000 |
Applying ethical principles to information and communication technology research: A companion to the Menlo Report D Dittrich, E Kenneally, M Bailey Available at SSRN 2342036, 2013 | 31 | 2013 |