Follow
James Hoagland
James Hoagland
Uber
Verified email at hoagland.org - Homepage
Title
Cited by
Cited by
Year
Practical automated detection of stealthy portscans
S Staniford, JA Hoagland, JM McAlerney
Journal of Computer Security 10 (1-2), 105-136, 2002
7762002
GrIDS-a graph based intrusion detection system for large networks
S Staniford-Chen, S Cheung, R Crawford, M Dilger, J Frank, J Hoagland, ...
Proceedings of the 19th national information systems security conference 1 …, 1996
7631996
Security policy specification using a graphical approach
JA Hoagland, R Pandey, KN Levitt
arXiv preprint cs/9809124, 1998
1091998
Security concerns with IP tunneling
S Krishnan, D Thaler, J Hoagland
482011
Specifying and implementing security policies using LaSCO, the language for security constraints on objects
JA Hoagland
University of California, Davis, 2000
462000
A uniform format for IPv6 extension headers
S Krishnan, J Woodyatt, E Kline, J Hoagland, M Bhatia
432012
Port scanning techniques and the defense against them
R Christopher
432002
Viewing ids alerts: Lessons from snortsnarf
JA Hoagland, S Staniford
Proceedings DARPA Information Survivability Conference and Exposition II …, 2001
312001
The Teredo protocol: Tunneling past network security and other security implications
J Hoagland
Symantec Response whitepaper, November, 2006
222006
Audit Log Analysis Using the Visual Audit Browser Toolkit
J Hoagland, C Wee, K Levitt
Technical Report CSE-95-11, Department of Computer Science, University of …, 1995
221995
Symantec internet security threat report: Trends for january-june 07
D Turner, S Entwisle, E Johnson, M Fossi, J Blackbird, D McKinney, ...
Technical report, Symantec Inc, 2007
212007
SPADE, Silicon Defense
J Hoagland, S Staniford
Nov 1, 1-4, 2000
202000
M. Bhatia," A Uniform Format for IPv6 Extension Headers
S Krishnan, J Woodyatt, E Kline, J Hoagland
RFC 6564, April, 2012
152012
Teredo security updates
D Thaler, S Krishnan, J Hoagland
132010
Specifying and enforcing policies using LaSCO: The language for security constraints on objects
JA Hoagland, R Pandey, KN Levitt
Department of Computer Science, University of California, Davis …, 1999
101999
Windows vista network attack surface analysis
J Hoagland, M Conover, T Newsham, O Whitehouse
Symantec Response whitepaper, 2007
62007
The Teredo Protocol: Tunneling Past Network Security and Other Security Implications, Symantec
J Hoagland
62007
Internet security
BK Lee, EH Jeong
Namdoo Books, 2005
5*2005
A graph-based language for specifying security policies
JA Hoagland, R Pandey, KN Levitt
citeseer. ist. psu. edu/144987. html, 0
4
Teredo Security Updates
S Krishnan, J Hoagland
Draft Update 2, 2008
12008
The system can't perform the operation now. Try again later.
Articles 1–20