Author of the publication

A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security.

, , , , , , and . Proc. VLDB Endow., 12 (12): 1802-1805 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Paladin: Automated Generation of Reproducible Test Cases for Android Apps., , , , and . HotMobile, page 99-104. ACM, (2019)Behavior Query Discovery in System-Generated Temporal Graphs., , , , , , , and . Proc. VLDB Endow., 9 (4): 240-251 (2015)Improving mobile application security via bridging user expectations and application behaviors., , , , and . HotSoS, page 32. ACM, (2014)A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security., , , , , , and . Proc. VLDB Endow., 12 (12): 1802-1805 (2019)Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools., , , , , , , , , and 1 other author(s). CCS, page 2396-2410. ACM, (2023)DISTDET: A Cost-Effective Distributed Cyber Threat Detection System., , , , , , , and . USENIX Security Symposium, page 6575-6592. USENIX Association, (2023)On the Security Risks of Knowledge Graph Reasoning., , , , , , , , and . USENIX Security Symposium, page 3259-3276. USENIX Association, (2023)Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit., , , , , , , , , and . WWW, page 3327-3335. ACM, (2022)Characterizing Android App Signing Issues., , , , and . ASE, page 280-292. IEEE, (2019)DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps., , , , , and . ICSE, page 685-697. ACM, (2022)