Conference Papers and Technical Reports
-
Securing Email Archives through User Modeling,
Yiru Li, Anil Somayaji.
21st Annual Computer Security Applications Conference (ACSAC),
Dec. 5-9, 2005, Tucson, Arizona.
-
Detecting Intra-Enterprise Scanning Worms Based on Address Resolution.
D. Whyte, P.C. van Oorschot, E. Kranakis.
21st Annual Computer Security Applications Conference (2005 ACSAC),
Dec. 5-9, 2005, Tucson, Arizona.
pdf.
-
Towards Network Awarenss
Evan Hughes, Anil Somayaji.
Carleton University, School of Computer Science,
19th Large Installation System Administration (LISA) Conference (December 4 2005).
-
Analysis of BGP Prefix Origins During Google's May 2005 Outage.
Tao Wan, P.C. Van Oorschot.
Carleton University, School of Computer Science,
Technical Report TR-05-09 (15 November 2005).
-
On Inter-domain Routing Security and Pretty Secure BGP (psBGP).
E. Kranakis, P.C. van Oorschot, T. Wan.
Carleton University, School of Computer Science,
Technical Report TR-05-08 (20 September 2005).
-
Instant Messaging Worms, Analysis and Countermeasures.
M. Mannan, P.C. van Oorschot.
WORM 2005 (ACM Workshop on Rapid Malcode), Nov. 2005, Fairfax, VA.
pdf.
-
A Selective Introduction to Border Gateway Protocol (BGP) Security Issues.
T. Wan, P.C. van Oorschot, E. Kranakis.
Carleton University, School of Computer Science,
Technical Report TR-05-07 (August 2005).
Also in:
Proc. of NATO Advanced Studies Institute on
Network Security and Intrusion Detection,
Nork, Yerevan, Armenia, Oct.1-12 2005, IOS Press (to appear, 2006).
-
Mitigating Network Denial of Service through Diversity-Based
Traffic Management.
A. Matrawy, P.C. van Oorschot, A. Somayaji.
Applied Cryptography and Network Security: Third International Conference,
ACNS 2005, New York, June 7-10, 2005.
pdf.
Proceedings, Springer LNCS 3531, pp.104-121, 2005.
-
Addressing Malicious SMTP-based Mass-Mailing Activity Within an
Enterprise Network.
D. Whyte, P.C. van Oorschot, E. Kranakis.
Carleton University, School of Computer Science,
Technical Report TR-05-06 (May 2005).
-
Pretty Secure BGP.
T. Wan, E. Kranakis, P.C. van Oorschot.
Network and Distributed System Security Symposium
(NDSS'05), Feb. 2005, San Diego.
pdf,
ps.
-
DNS-based Detection of Scanning Worms in an Enterprise Network.
D. Whyte, E. Kranakis, P.C. van Oorschot.
Network and Distributed System Security Symposium
(NDSS'05), Feb.2005, San Diego.
pdf.
Journal Papers
-
Hardware-assisted circumvention of self-hashing software tamper resistance.
P.C. van Oorschot, A. Somayaji, G. Wurster.
pdf (C) IEEE.
IEEE Transactions on Dependable and Secure Computing,
vol.2 no.2 (Apr.-June 2005).
Theses
-
Email archives Intrusion Detection.
Yiru Li, A. Somayaji. M.C.S. Thesis. Carleton University. Fall, 2005.
Related Work
Marsha Chechik http://www.cs.toronto.edu/~chechik/publications.html
Scott Knight http://tarpit.rmc.ca/knight/Publications.html
David Lie http://www.eecg.toronto.edu/~lie/pubs.htm
Paul van Oorschot http://www.scs.carleton.ca/~paulv/papers/pubs.html
Anil Somayaji http://www.scs.carleton.ca/~soma/publications.html
Mohammad Zulkernine http://www.cs.queensu.ca/~qrst/pub.htm