Holding intruders accountable on the Internet

S. Staniford-Chen , L.T. Heberlein
ieee symposium on security and privacy 39 -49

294
1995
Distributed Tracing of Intruders

Stuart G Staniford-Chen

9
1995
Experiences implementing a common format for IDS alerts

M. Erlinger , B. Feinstein , G. Matthews , S. Staniford
annual computer security applications conference 113 -113

1
2001
Viewing IDS alerts: lessons from SnortSnarf

J.A. Hoagland , S. Staniford
darpa information survivability conference and exposition 1 374 -386

25
2001
Towards faster string matching for intrusion detection or exceeding the speed of Snort

C.J. Coit , S. Staniford , J. McAlerney
darpa information survivability conference and exposition 1 367 -373

339
2001
Inside the Slammer worm

D. Moore , V. Paxson , S. Savage , C. Shannon
ieee symposium on security and privacy 1 ( 4) 33 -39

937
2003
Worms vs. perimeters: the case for hard-LANs

N. Weaver , D. Ellis , S. Staniford , V. Paxson
high performance interconnects 70 -76

28
2004
518
2014
348
2015
Detecting malicious network content

Ashar Aziz , Stuart Gresley Staniford , Muhammad Amin , Henry Uyeno

336
2016
153
2016
Systems and methods for analyzing PDF documents

Stuart Gresley Staniford , Ashar Aziz

138
2018
2014
Military Strategy in CyberSpace.

Stuart Staniford
usenix security symposium

2004
How to Own the Internet in Your Spare Time

Vern Paxson , Stuart Staniford , Nicholas Weaver
usenix security symposium 149 -167

1,753
2002
Very fast containment of scanning worms

Vern Paxson , Stuart Staniford , Nicholas Weaver
usenix security symposium 3 -3

329
2004
Electronic message analysis for malware detection

Stuart Staniford , Jay Manni , Henry Uyeno , Amin Sukhera

257
2012
The top speed of flash worms

Stuart Staniford , David Moore , Vern Paxson , Nicholas Weaver
workshop on rapid malcode 33 -42

179
2004