Author of the publication

Detecting and Characterizing Lateral Phishing at Scale.

, , , , , , , and . USENIX Security Symposium, page 1273-1290. USENIX Association, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PrismDB: Read-aware Log-structured Merge Trees for Heterogeneous Storage., , , and . CoRR, (2020)Bandana: Using Non-volatile Memory for Storing Deep Learning Models., , , , , , , and . CoRR, (2018)Packing Privacy Budget Efficiently., , , , , , and . CoRR, (2022)Efficient Compactions between Storage Tiers with PrismDB., , , and . ASPLOS (3), page 179-193. ACM, (2023)Cliffhanger: Scaling Performance Cliffs in Web Memory Caches., , , and . NSDI, page 379-392. USENIX Association, (2016)Memshare: a Dynamic Multi-tenant Key-value Cache., , , and . USENIX Annual Technical Conference, page 321-334. USENIX Association, (2017)Privacy Budget Scheduling., , , , , and . OSDI, page 55-74. USENIX Association, (2021)Flashield: a Key-value Cache that Minimizes Writes to Flash., , , , , , and . CoRR, (2017)A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts., , , , , and . CoRR, (2020)Venus: verification for untrusted cloud storage., , , , , and . CCSW, page 19-30. ACM, (2010)