Ed Skoudis

According to our database1, Ed Skoudis authored at least 12 papers between 2007 and 2011.

Collaborative distances:
  • no known Dijkstra number2.
  • no known Erdős number3.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2011
Uniform Resource Locators (URLs): Obscuring.
Proceedings of the Encyclopedia of Information Assurance, 2011

Sploits.
Proceedings of the Encyclopedia of Information Assurance, 2011

Open Source.
Proceedings of the Encyclopedia of Information Assurance, 2011

Hackers: Tools and Techniques.
Proceedings of the Encyclopedia of Information Assurance, 2011

Hackers: Hiring Ex-Criminal.
Proceedings of the Encyclopedia of Information Assurance, 2011

Hackers: Attacks and Defenses.
Proceedings of the Encyclopedia of Information Assurance, 2011

2007
The Evolution of the Sploit.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Open Source versus Closed Source.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Hacker Attacks and Defenses.
Proceedings of the Information security management handbook, Sixth Edition., 2007

A New Breed of Hacker Tools and Defenses.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Hacker Tools and Techniques.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Hiding Virtualization from Attackers and Malware.
IEEE Secur. Priv., 2007


  Loading...