Method and apparatus for identifying computing resource trajectory

Alfred Huger , Elias Levy , Zulfikar Ramzan , Oliver Friedrichs

7
2014
Early warning system for network attacks

Oliver Friedrichs , Elias Levy , Alfred Huger , George Tomic

224
2003
93
2010
Criminals Become Tech Savvy

Elias Levy , Ivan Arce
ieee symposium on security and privacy 2 ( 2) 65 -68

57
2004
Approaching zero

Elias Levy
IEEE Security & Privacy 2 ( 4) 65 -66

50
2004
Wide open source

Elias Levy
SecurityFocus. com. Electronic document. http://www. securityfocus. com/news 19

24
2000
New threats and attacks on the world wide web

Elias Levy , Iván Arce
IEEE Security & Privacy 234 -266

13
2006
Full disclosure is a necessary evil

Elias Levy
SecurityFocus

8
2001
5
2013
Cyber Attacks

Elias Levy , Dave Dittrich , James Adams , Jeffrey Hunker
WAMU, American University

2000
Worst-Case Scenario

E. Levy
ieee symposium on security and privacy 4 ( 5) 71 -73

110
2006
Worm propagation and generic attacks

E. Levy
ieee symposium on security and privacy 3 ( 2) 63 -65

19
2005
Interface illusions

E. Levy
ieee symposium on security and privacy 2 ( 6) 66 -69

16
2004
Poisoning the software supply chain

E. Levy
ieee symposium on security and privacy 1 ( 3) 70 -73

33
2003
The making of a spam zombie army. Dissecting the Sobig worms

E. Levy
ieee symposium on security and privacy 1 ( 4) 58 -59

24
2003
Crossover: online pests plaguing the off line world

E. Levy
ieee symposium on security and privacy 1 ( 6) 71 -73

20
2003
An analysis of the Slapper worm

I. Arce , E. Levy
ieee symposium on security and privacy 1 ( 1) 82 -87

79
2003