Volgen
Guofei Gu
Guofei Gu
Professor, Department of Computer Science & Engineering, Texas A&M University
Geverifieerd e-mailadres voor cse.tamu.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
G Gu, R Perdisci, J Zhang, W Lee
16212008
BotSniffer: Detecting botnet command and control channels in network traffic
G Gu, J Zhang, W Lee
12612008
Bothunter: Detecting malware infection through ids-driven dialog correlation.
G Gu, PA Porras, V Yegneswaran, MW Fong, W Lee
USENIX Security Symposium 7, 1-16, 2007
11852007
FRESCO: Modular Composable Security Services for Software-Defined Networks
S Shin, P Porras, V Yegneswaran, M Fong, G Gu, M Tyson
20th Annual Network & Distributed System Security Symposium (NDSS'13), 2013
9302013
Avant-guard: Scalable and vigilant switch flow management in software-defined networks
S Shin, V Yegneswaran, P Porras, G Gu
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
8192013
A security enforcement kernel for OpenFlow networks
P Porras, S Shin, V Yegneswaran, M Fong, M Tyson, G Gu
Proceedings of the first workshop on Hot topics in software defined networks …, 2012
7962012
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
5522013
TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection
T Wang, T Wei, G Gu, W Zou
2010 IEEE Symposium on Security and Privacy, 497-512, 2010
5332010
Poisoning network visibility in software-defined networks: New attacks and countermeasures.
S Hong, L Xu, H Wang, G Gu
Ndss 15, 8-11, 2015
5002015
Attacking software-defined networks: A first feasibility study
S Shin, G Gu
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013
4612013
Vetting undesirable behaviors in android apps with permission use analysis
Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
4512013
Empirical evaluation and new design for fighting evolving twitter spammers
C Yang, R Harkreader, G Gu
IEEE Transactions on Information Forensics and Security 8 (8), 1280-1293, 2013
4312013
Floodguard: A dos attack prevention extension in software-defined networks
H Wang, L Xu, G Gu
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
4292015
Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter
C Yang, R Harkreader, J Zhang, S Shin, G Gu
Proceedings of the 21st international conference on World Wide Web, 71-80, 2012
4252012
A taxonomy of botnet structures
D Dagon, G Gu, CP Lee, W Lee
Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third …, 2007
3972007
Method and apparatus for detecting malware infection
G Gu, PA Porras, M Fong
US Patent 8,955,122, 2015
3762015
Method and apparatus for detecting malware infection
G Gu, PA Porras, M Fong
US Patent 8,955,122, 2015
3762015
METHOD AND APPARATUS FOR DETECTING MALWARE INFECTION
G Gu, PA Porras, M Fong
US Patent App. 20,090/172,815, 2008
376*2008
Smartdroid: an automatic system for revealing ui-based trigger conditions in android applications
C Zheng, S Zhu, S Dai, G Gu, X Gong, X Han, W Zou
Proceedings of the second ACM workshop on Security and privacy in …, 2012
3642012
Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers
C Yang, RC Harkreader, G Gu
Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011
3612011
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20