Hide and seek: An introduction to steganography N Provos, P Honeyman IEEE security & privacy 1 (3), 32-44, 2003 | 1737 | 2003 |
A Virtual Honeypot Framework. N Provos USENIX Security Symposium 173 (2004), 1-14, 2004 | 1089 | 2004 |
Defending against statistical steganalysis N Provos 10th USENIX Security Symposium (USENIX Security 01), 2001 | 977 | 2001 |
All your iframes point to us N Provos, P Mavrommatis, M Abu Rajab, F Monrose | 769* | 2008 |
Improving Host Security with System Call Policies. N Provos USENIX Security Symposium, 257-272, 2003 | 765 | 2003 |
A framework for detection and measurement of phishing attacks S Garera, N Provos, M Chew, AD Rubin Proceedings of the 2007 ACM workshop on Recurring malcode, 1-8, 2007 | 707 | 2007 |
The Ghost in the Browser: Analysis of Web-based Malware. N Provos, D McNamee, P Mavrommatis, K Wang, N Modadugu HotBots 7, 4-4, 2007 | 695 | 2007 |
Virtual honeypots: from botnet tracking to intrusion detection N Provos, T Holz Pearson Education, 2007 | 620 | 2007 |
Detecting steganographic content on the internet N Provos, P Honeyman Center for Information Technology Integration, 2001 | 526 | 2001 |
Preventing privilege escalation N Provos, M Friedl, P Honeyman 12th USENIX Security Symposium (USENIX Security 03), 2003 | 494 | 2003 |
A future-adaptable password scheme. N Provos, D Mazieres USENIX Annual Technical Conference, FREENIX Track 1999, 81-91, 1999 | 417 | 1999 |
Manufacturing compromise: the emergence of exploit-as-a-service C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ... Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 300 | 2012 |
Intrusive software management N Provos, Y Zhou, CW Bavor, EL Davis, M Palatucci, KP Nigam, ... US Patent App. 12/041,309, 2009 | 299 | 2009 |
Honeyd-a virtual honeypot daemon N Provos 10th dfn-cert workshop, hamburg, germany 2, 4, 2003 | 269 | 2003 |
System and method of accessing a document efficiently through multi-tier web caching ER Fredricksen, FJ Schneider, JA Dean, S Ghemawat, N Provos, G Harik US Patent 7,437,364, 2008 | 236 | 2008 |
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. D Dagon, N Provos, CP Lee, W Lee NDSS 2, 2.3, 2008 | 172 | 2008 |
System and method of accessing a document efficiently through multi-tier web caching ER Fredricksen, FJ Schneider, JA Dean, S Ghemawat, N Provos, G Harik US Patent 8,275,790, 2012 | 166 | 2012 |
Encrypting virtual memory N Provos 9th USENIX Security Symposium (USENIX Security 00), 2000 | 161 | 2000 |
Ad injection at scale: Assessing deceptive advertisement modifications K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ... 2015 IEEE Symposium on Security and Privacy, 151-167, 2015 | 159 | 2015 |
Cybercrime 2.0: when the cloud turns dark N Provos, MA Rajab, P Mavrommatis Communications of the ACM 52 (4), 42-47, 2009 | 130 | 2009 |