search
menu
icon-carat-right
cmu-wordmark
✕
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
Enterprise Risk and Resilience Management
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webcasts
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity and Inclusion
Internship Opportunities
Working at the SEI
Carnegie Mellon University
Software Engineering Institute
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cloud Computing
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webcasts Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity, and Inclusion
Internship Opportunities
Home
Publications
Authors
Timur D. Snoke
Timur Snoke
Software Engineering Institute
All
Tech Publications
Blog Posts
Podcasts
Videos
The Threat of Deprecated BGP Attributes
June 3, 2024
•
Blog Post
By
Leigh B. Metcalf
,
Timur D. Snoke
Detecting and Grouping Malware Using Section Hashes
June 5, 2023
•
Blog Post
By
Timur D. Snoke
,
Michael Jacobs
Coordinated Vulnerability Disclosure User Stories
August 25, 2022
•
White Paper
By
Brad Runyon
,
Eric Hatleback
,
Allen D. Householder
,
Art Manion
,
Vijay S. Sarvepalli
,
Timur D. Snoke
,
Jonathan Spring
,
Laurie Tyzenhaus
,
Charles G. Yarbrough
An Updated Framework of Defenses Against Ransomware
August 18, 2020
•
White Paper
By
Timur D. Snoke
,
Timothy J. Shimeall
Solving Current Cyber Challenges: Academic and Industry Collaboration
June 19, 2020
•
Webcast
By
Timothy J. Shimeall
,
Timur D. Snoke
More from Timur Snoke
Coordinated Vulnerability Disclosure User Stories
August 25, 2022
•
White Paper
By
Brad Runyon
,
Eric Hatleback
,
Allen D. Householder
,
Art Manion
,
Vijay S. Sarvepalli
,
Timur D. Snoke
,
Jonathan Spring
,
Laurie Tyzenhaus
,
Charles G. Yarbrough
An Updated Framework of Defenses Against Ransomware
August 18, 2020
•
White Paper
By
Timur D. Snoke
,
Timothy J. Shimeall
The Routing Table Tool Suite (RT-Tools): Mapping the Internet One Route at a Time or All Routes at One Time
January 13, 2014
•
Poster
By
Timur D. Snoke
More from Timur Snoke
The Threat of Deprecated BGP Attributes
June 3, 2024
•
Blog Post
By
Leigh B. Metcalf
,
Timur D. Snoke
Detecting and Grouping Malware Using Section Hashes
June 5, 2023
•
Blog Post
By
Timur D. Snoke
,
Michael Jacobs
Situational Awareness for Cybersecurity Architecture: Network Visibility
March 23, 2020
•
Blog Post
By
Timur D. Snoke
Engineering for Cyber Situational Awareness: Endpoint Visibility
February 10, 2020
•
Blog Post
By
Phil Groce
,
Timur D. Snoke
Best Practices in Network Traffic Analysis: Three Perspectives
October 8, 2018
•
Blog Post
By
Angela Horneman
,
Timothy J. Shimeall
,
Timur D. Snoke
More from Timur Snoke
Applying Best Practices in Network Traffic Analysis
November 29, 2018
•
Podcast
By
Timothy J. Shimeall
,
Timur D. Snoke
How to Be a Network Traffic Analyst
September 13, 2018
•
Podcast
By
Timothy J. Shimeall
,
Timur D. Snoke
NTP Best Practices
May 25, 2017
•
Podcast
By
Timur D. Snoke
More from Timur Snoke
Solving Current Cyber Challenges: Academic and Industry Collaboration
June 19, 2020
•
Webcast
By
Timothy J. Shimeall
,
Timur D. Snoke
More from Timur Snoke
Send a Message