Niels Provos
Niels Provos
Stripe
Verified email at stripe.com - Homepage
Title
Cited by
Cited by
Year
Hide and seek: An introduction to steganography
N Provos, P Honeyman
IEEE security & privacy 1 (3), 32-44, 2003
15642003
A Virtual Honeypot Framework.
N Provos
USENIX Security Symposium 173 (2004), 1-14, 2004
9412004
Defending Against Statistical Steganalysis.
N Provos
Usenix security symposium 10, 323-336, 2001
8932001
All your iframes point to us
N Provos, P Mavrommatis, M Abu Rajab, F Monrose
728*2008
Improving Host Security with System Call Policies.
N Provos
USENIX Security Symposium, 257-272, 2003
7032003
The Ghost in the Browser: Analysis of Web-based Malware.
N Provos, D McNamee, P Mavrommatis, K Wang, N Modadugu
HotBots 7, 4-4, 2007
6492007
A framework for detection and measurement of phishing attacks
S Garera, N Provos, M Chew, AD Rubin
Proceedings of the 2007 ACM workshop on Recurring malcode, 1-8, 2007
5622007
Virtual honeypots: from botnet tracking to intrusion detection
N Provos, T Holz
Pearson Education, 2007
5532007
Detecting steganographic content on the internet
N Provos, P Honeyman
Center for Information Technology Integration, 2001
4892001
Preventing Privilege Escalation.
N Provos, M Friedl, P Honeyman
USENIX Security Symposium, 2003
4312003
A Future-Adaptable Password Scheme.
N Provos, D Mazieres
USENIX Annual Technical Conference, FREENIX Track, 81-91, 1999
3291999
Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions
G Xuan, YQ Shi, J Gao, D Zou, C Yang, Z Zhang, P Chai, C Chen, ...
International Workshop on Information Hiding, 262-277, 2005
2642005
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2592012
Intrusive software management
N Provos, Y Zhou, CW Bavor, EL Davis, M Palatucci, KP Nigam, ...
US Patent App. 12/041,309, 2009
2442009
System and method of accessing a document efficiently through multi-tier web caching
ER Fredricksen, FJ Schneider, JA Dean, S Ghemawat, N Provos, G Harik
US Patent 7,437,364, 2008
2252008
Honeyd-a virtual honeypot daemon
N Provos
10th DFN-CERT Workshop, Hamburg, Germany 2, 4, 2003
2092003
Encrypting Virtual Memory.
N Provos
USENIX Security Symposium, 35-44, 2000
1572000
Lossless data hiding using histogram shifting method based on integer wavelets
G Xuan, Q Yao, C Yang, J Gao, P Chai, YQ Shi, Z Ni
International Workshop on Digital Watermarking, 323-332, 2006
1562006
Corrupted DNS resolution paths: The rise of a malicious resolution authority
D Dagon, C Lee, W Lee, N Provos
1442008
System and method of accessing a document efficiently through multi-tier web caching
ER Fredricksen, FJ Schneider, JA Dean, S Ghemawat, N Provos, G Harik
US Patent 8,275,790, 2012
1222012
The system can't perform the operation now. Try again later.
Articles 1–20