Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection G Gu, R Perdisci, J Zhang, W Lee | 1642 | 2008 |
BotSniffer: Detecting botnet command and control channels in network traffic G Gu, J Zhang, W Lee | 1271 | 2008 |
Bothunter: Detecting malware infection through ids-driven dialog correlation. G Gu, PA Porras, V Yegneswaran, MW Fong, W Lee USENIX Security Symposium 7, 1-16, 2007 | 1197 | 2007 |
FRESCO: Modular Composable Security Services for Software-Defined Networks S Shin, P Porras, V Yegneswaran, M Fong, G Gu, M Tyson 20th Annual Network & Distributed System Security Symposium (NDSS'13), 2013 | 937 | 2013 |
Avant-guard: Scalable and vigilant switch flow management in software-defined networks S Shin, V Yegneswaran, P Porras, G Gu Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 835 | 2013 |
A security enforcement kernel for OpenFlow networks P Porras, S Shin, V Yegneswaran, M Fong, M Tyson, G Gu Proceedings of the first workshop on Hot topics in software defined networks …, 2012 | 799 | 2012 |
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 559 | 2013 |
TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection T Wang, T Wei, G Gu, W Zou 2010 IEEE Symposium on Security and Privacy, 497-512, 2010 | 541 | 2010 |
Poisoning network visibility in software-defined networks: New attacks and countermeasures. S Hong, L Xu, H Wang, G Gu Ndss 15, 8-11, 2015 | 511 | 2015 |
Attacking software-defined networks: A first feasibility study S Shin, G Gu Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013 | 467 | 2013 |
Vetting undesirable behaviors in android apps with permission use analysis Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 452 | 2013 |
Empirical evaluation and new design for fighting evolving twitter spammers C Yang, R Harkreader, G Gu IEEE Transactions on Information Forensics and Security 8 (8), 1280-1293, 2013 | 448 | 2013 |
Floodguard: A dos attack prevention extension in software-defined networks H Wang, L Xu, G Gu 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015 | 441 | 2015 |
Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter C Yang, R Harkreader, J Zhang, S Shin, G Gu Proceedings of the 21st international conference on World Wide Web, 71-80, 2012 | 429 | 2012 |
A taxonomy of botnet structures D Dagon, G Gu, CP Lee, W Lee Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third …, 2007 | 398 | 2007 |
METHOD AND APPARATUS FOR DETECTING MALWARE INFECTION G Gu, PA Porras, M Fong US Patent App. 20,090/172,815, 2008 | 387* | 2008 |
Smartdroid: an automatic system for revealing ui-based trigger conditions in android applications C Zheng, S Zhu, S Dai, G Gu, X Gong, X Han, W Zou Proceedings of the second ACM workshop on Security and privacy in …, 2012 | 365 | 2012 |
Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers C Yang, RC Harkreader, G Gu Recent Advances in Intrusion Detection: 14th International Symposium, RAID …, 2011 | 360 | 2011 |
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?) S Shin, G Gu 2012 20th IEEE international conference on network protocols (ICNP), 1-6, 2012 | 326 | 2012 |
Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems R Perdisci, G Gu, W Lee Sixth International Conference on Data Mining (ICDM'06), 488-498, 2006 | 321 | 2006 |