Conference Papers and Technical Reports

  1. Securing Email Archives through User Modeling, Yiru Li, Anil Somayaji. 21st Annual Computer Security Applications Conference (ACSAC), Dec. 5-9, 2005, Tucson, Arizona.
  2. Detecting Intra-Enterprise Scanning Worms Based on Address Resolution. D. Whyte, P.C. van Oorschot, E. Kranakis. 21st Annual Computer Security Applications Conference (2005 ACSAC), Dec. 5-9, 2005, Tucson, Arizona. pdf.
  3. Towards Network Awarenss Evan Hughes, Anil Somayaji. Carleton University, School of Computer Science, 19th Large Installation System Administration (LISA) Conference (December 4 2005).
  4. Analysis of BGP Prefix Origins During Google's May 2005 Outage. Tao Wan, P.C. Van Oorschot. Carleton University, School of Computer Science, Technical Report TR-05-09 (15 November 2005).
  5. On Inter-domain Routing Security and Pretty Secure BGP (psBGP). E. Kranakis, P.C. van Oorschot, T. Wan. Carleton University, School of Computer Science, Technical Report TR-05-08 (20 September 2005).
  6. Instant Messaging Worms, Analysis and Countermeasures. M. Mannan, P.C. van Oorschot. WORM 2005 (ACM Workshop on Rapid Malcode), Nov. 2005, Fairfax, VA. pdf.
  7. A Selective Introduction to Border Gateway Protocol (BGP) Security Issues. T. Wan, P.C. van Oorschot, E. Kranakis. Carleton University, School of Computer Science, Technical Report TR-05-07 (August 2005). Also in: Proc. of NATO Advanced Studies Institute on Network Security and Intrusion Detection, Nork, Yerevan, Armenia, Oct.1-12 2005, IOS Press (to appear, 2006).
  8. Mitigating Network Denial of Service through Diversity-Based Traffic Management. A. Matrawy, P.C. van Oorschot, A. Somayaji. Applied Cryptography and Network Security: Third International Conference, ACNS 2005, New York, June 7-10, 2005. pdf. Proceedings, Springer LNCS 3531, pp.104-121, 2005.
  9. Addressing Malicious SMTP-based Mass-Mailing Activity Within an Enterprise Network. D. Whyte, P.C. van Oorschot, E. Kranakis. Carleton University, School of Computer Science, Technical Report TR-05-06 (May 2005).
  10. Pretty Secure BGP. T. Wan, E. Kranakis, P.C. van Oorschot. Network and Distributed System Security Symposium (NDSS'05), Feb. 2005, San Diego. pdf, ps.
  11. DNS-based Detection of Scanning Worms in an Enterprise Network. D. Whyte, E. Kranakis, P.C. van Oorschot. Network and Distributed System Security Symposium (NDSS'05), Feb.2005, San Diego. pdf.

Journal Papers

Theses

Related Work

Marsha Chechik http://www.cs.toronto.edu/~chechik/publications.html
Scott Knight http://tarpit.rmc.ca/knight/Publications.html
David Lie http://www.eecg.toronto.edu/~lie/pubs.htm
Paul van Oorschot http://www.scs.carleton.ca/~paulv/papers/pubs.html
Anil Somayaji http://www.scs.carleton.ca/~soma/publications.html
Mohammad Zulkernine http://www.cs.queensu.ca/~qrst/pub.htm