Follow
James Hoagland
James Hoagland
Uber
Verified email at hoagland.org - Homepage
Title
Cited by
Cited by
Year
Practical automated detection of stealthy portscans
S Staniford, JA Hoagland, JM McAlerney
Journal of Computer Security 10 (1-2), 105-136, 2002
7792002
GrIDS-a graph based intrusion detection system for large networks
S Staniford-Chen, S Cheung, R Crawford, M Dilger, J Frank, J Hoagland, ...
Proceedings of the 19th national information systems security conference 1 …, 1996
7631996
Security policy specification using a graphical approach
JA Hoagland, R Pandey, KN Levitt
arXiv preprint cs/9809124, 1998
1091998
Security concerns with IP tunneling
S Krishnan, D Thaler, J Hoagland
482011
Specifying and implementing security policies using LaSCO, the language for security constraints on objects
JA Hoagland
University of California, Davis, 2000
462000
Port scanning techniques and the defense against them
R Christopher
442002
A uniform format for IPv6 extension headers
S Krishnan, J Woodyatt, E Kline, J Hoagland, M Bhatia
432012
Viewing ids alerts: Lessons from snortsnarf
JA Hoagland, S Staniford
Proceedings DARPA Information Survivability Conference and Exposition II …, 2001
312001
The Teredo protocol: Tunneling past network security and other security implications
J Hoagland
Symantec Response whitepaper, November, 2006
222006
Audit Log Analysis Using the Visual Audit Browser Toolkit
J Hoagland, C Wee, K Levitt
Technical Report CSE-95-11, Department of Computer Science, University of …, 1995
221995
Symantec internet security threat report: Trends for january-june 07
D Turner, S Entwisle, E Johnson, M Fossi, J Blackbird, D McKinney, ...
Technical report, Symantec Inc, 2007
212007
SPADE, Silicon Defense
J Hoagland, S Staniford
Nov 1, 1-4, 2000
202000
M. Bhatia," A Uniform Format for IPv6 Extension Headers
S Krishnan, J Woodyatt, E Kline, J Hoagland
RFC 6564, April, 2012
152012
Teredo security updates
D Thaler, S Krishnan, J Hoagland
132010
Specifying and enforcing policies using LaSCO: The language for security constraints on objects
JA Hoagland, R Pandey, KN Levitt
Department of Computer Science, University of California, Davis …, 1999
101999
Windows vista network attack surface analysis
J Hoagland, M Conover, T Newsham, O Whitehouse
Symantec Response whitepaper, 2007
62007
The Teredo Protocol: Tunneling Past Network Security and Other Security Implications, Symantec
J Hoagland
62007
Internet security
BK Lee, EH Jeong
Namdoo Books, 2005
5*2005
A graph-based language for specifying security policies
JA Hoagland, R Pandey, KN Levitt
citeseer. ist. psu. edu/144987. html, 0
4
Teredo Security Updates
S Krishnan, J Hoagland
Draft Update 2, 2008
12008
The system can't perform the operation now. Try again later.
Articles 1–20