Follow
Michael Donald Bailey
Michael Donald Bailey
Verified email at gatech.edu - Homepage
Title
Cited by
Cited by
Year
Understanding the Mirai Botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
19652017
The matter of heartbleed
Z Durumeric, F Li, J Kasten, J Amann, J Beekman, M Payer, N Weaver, ...
Proceedings of the 2014 conference on internet measurement conference, 475-488, 2014
9382014
Automated classification and analysis of internet malware
M Bailey, J Oberheide, J Andersen, ZM Mao, F Jahanian, J Nazario
International Workshop on Recent Advances in Intrusion Detection, 178-197, 2007
8442007
A search engine backed by Internet-wide scanning
Z Durumeric, D Adrian, A Mirian, M Bailey, JA Halderman
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
5042015
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
X Chen, J Andersen, ZM Mao, M Bailey, J Nazario
2008 IEEE International Conference on Dependable Systems & Networks With …, 2008
4752008
Analysis of the HTTPS certificate ecosystem
Z Durumeric, J Kasten, M Bailey, JA Halderman
Proceedings of the 2013 conference on Internet measurement conference, 291-304, 2013
3922013
The Internet Motion Sensor-A Distributed Blackhole Monitoring System.
M Bailey, E Cooke, F Jahanian, J Nazario, D Watson
NDSS, 2005
3872005
A survey of botnet technology and defenses
M Bailey, E Cooke, F Jahanian, Y Xu, M Karir
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
3392009
Bohatei: Flexible and Elastic DDoS Defense.
SK Fayaz, Y Tobioka, V Sekar, M Bailey
USENIX Security Symposium, 817-832, 2015
3332015
An exploration of L2 cache covert channels in virtualized environments
Y Xu, M Bailey, F Jahanian, K Joshi, M Hiltunen, R Schlichting
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 29-40, 2011
3302011
Bobtail: Avoiding Long Tails in the Cloud.
Y Xu, Z Musgrave, B Noble, M Bailey
NSDI 13, 329-342, 2013
2822013
Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents.
Y Liu, A Sarabi, J Zhang, P Naghizadeh, M Karir, M Bailey, M Liu
USENIX Security Symposium, 1009-1024, 2015
2142015
Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks
J Czyz, M Kallitsis, M Gharaibeh, C Papadopoulos, M Bailey, M Karir
Proceedings of the 2014 Conference on Internet Measurement Conference, 435-448, 2014
2042014
An Internet-Wide View of Internet-Wide Scanning.
Z Durumeric, M Bailey, JA Halderman
USENIX Security Symposium, 65-78, 2014
2022014
Internet background radiation revisited
E Wustrow, M Karir, M Bailey, F Jahanian, G Huston
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 62-74, 2010
1942010
Measuring ipv6 adoption
J Czyz, M Allman, J Zhang, S Iekel-Johnson, E Osterweil, M Bailey
Proceedings of the 2015 ACM SIGCOMM Conference, 2015
1912015
The blaster worm: Then and now
M Bailey, E Cooke, F Jahanian, D Watson
IEEE Security & Privacy 3 (4), 26-31, 2005
1882005
Shades of Grey: On the effectiveness of reputation-based “blacklists”
S Sinha, M Bailey, F Jahanian
2008 3rd International Conference on Malicious and Unwanted Software …, 2008
1812008
The Security Impact of HTTPS Interception
Z Durumeric, Z Ma, D Springall, R Barnes, N Sullivan, E Bursztein, ...
Network and Distributed Systems Symposium (NDSS’17), 2017
1792017
Toward understanding distributed blackhole placement
E Cooke, M Bailey, ZM Mao, D Watson, F Jahanian, D McPherson
Proceedings of the 2004 ACM workshop on Rapid malcode, 54-64, 2004
1782004
The system can't perform the operation now. Try again later.
Articles 1–20