search
menu
icon-carat-right
cmu-wordmark
✕
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
Enterprise Risk and Resilience Management
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webinar Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity and Inclusion
Internship Opportunities
Working at the SEI
Carnegie Mellon University
Software Engineering Institute
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cloud Computing
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webcasts Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity, and Inclusion
Internship Opportunities
Home
Publications
Authors
Rhiannon Weaver
Rhiannon Weaver
Rhiannon Weaver is an SEI alumni employee.
All
Tech Publications
Videos
Finding Related Malware Samples Using Run-Time Features
November 30, 2015
•
Webcast
By
Rhiannon Weaver
Entropy-Based Measurement of IP Address Inflation in the Waledac Botnet
January 10, 2011
•
Presentation
By
Rhiannon Weaver
,
Chris Nunnery (University of North Carolina)
,
Gautam Singaraju (University of North Carolina)
Modeling Populations of Large-Scale Internet Threats
August 4, 2010
•
Presentation
By
Rhiannon Weaver
A Continuous Time List Capture Model for Internet Threats
August 4, 2010
•
White Paper
By
Rhiannon Weaver
Identifying Anomalous Port-Specific Network Behavior
May 1, 2010
•
Technical Report
By
Rhiannon Weaver
More from Rhiannon Weaver
A Continuous Time List Capture Model for Internet Threats
August 4, 2010
•
White Paper
By
Rhiannon Weaver
Identifying Anomalous Port-Specific Network Behavior
May 1, 2010
•
Technical Report
By
Rhiannon Weaver
A Probabilistic Population Study of the Conficker-C Botnet
February 1, 2010
•
White Paper
By
Rhiannon Weaver
Fishing for Phishes: Applying Capture-Recapture Methods to Estimate Phishing Populations
October 4, 2007
•
White Paper
By
Rhiannon Weaver
,
M. P. Collins (Redjack)
More from Rhiannon Weaver
Finding Related Malware Samples Using Run-Time Features
November 30, 2015
•
Webcast
By
Rhiannon Weaver
More from Rhiannon Weaver