Information flow analysis for javascript S Just, A Cleary, B Shirley, C Hammer Proceedings of the 1st ACM SIGPLAN international workshop on Programming …, 2011 | 81 | 2011 |
A model for covert botnet communication in a private subnet B Shirley, CD Mano International Conference on Research in Networking, 624-632, 2008 | 16 | 2008 |
Sub-botnet coordination using tokens in a switched network B Shirley, CD Mano IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-5, 2008 | 12 | 2008 |
Bot detection evasion: a case study on local‐host alert correlation bot detection methods B Shirley, L Babu, C Mano Security and communication networks 5 (12), 1277-1295, 2012 | 7 | 2012 |
Very Low Frequency Propagation Mapper (VPM) Experience and Results from the Systems Engineering Cycle of a Small Satellite TW Gies, T Rodriquez, G Holt, L Jasper, B Shirley, C Enger, R Jaynes, ... | 1 | 2020 |
Developing and Securing Software for Small Space Systems BL Shirley Utah State University, 2019 | 1 | 2019 |
Multi-layered security approaches for a modular open network architecture-based satellite B Shirley, Q Young, P Wegner, J Christensen, J Janicik | 1 | 2014 |
Covert botnet design and defense analysis BL Shirley Utah State University, 2009 | 1 | 2009 |
AFRL Recurve Mission Success, Loss, Diagnosis, and Lessons Learned T de Caussin, K Yoshino, L Jasper, F Hinckley, B Shirley | | 2023 |
Multi-layered Approaches for a Modular Open Network Architecture-based Satellite B Shirley, Q Young, P Wegner, J Christensen, J Janicik | | |
Botnet Literature Review B Shirley | | |