Publications
(2014).
(2010).
(2013).
(2012).
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware.
Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007).
(2007).
(2013). Operational Experiences with High-Volume Network Intrusion Detection.
Proceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004). 11, 2.
(2004).
(2010). Policy-Controlled Event Management for Distributed Intrusion Detection.
Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05). 4, 385-391.
(2005).
(2008).
(2008). Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), Ottawa, Canada.
(Jha, S., Sommer R., & Kreibich C., Ed.).
(2010). Providing Dynamic Control to Passive Network Security Monitoring.
Proceedings of 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
(2015). Rethinking Hardware Support for Network Analysis and Intrusion Prevention.
Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06).
(2006).
(2012).
(2009).
(2011).
Specification Mining for Intrusion Detection in Networked Control Systems.
Proceedings of the 25th USENIX Security Symposium. 790-806.
(2016). Spicy: A Unified Deep Packet Inspection Framework Dissecting All Your Data.
ICSI Technical Report.
(2015). Spicy: A Unified Deep Packet Inspection Framework for Safely Dissecting All Your Data.
Proceedings of 2016 Annual Computer Security Applications Conference.
(2016). The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007). Stress Testing Cluster Bro.
Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007).
(2007).
(2013).
VAST: A Unified Platform for Interactive Network Forensics.
Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.
(2016). Viable Protection of High-Performance Networks through Hardware/Software Co-Design.
Proceedings of ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization.
(2017).