Author of the publication

Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.

, , , , , , , and . USENIX Security Symposium, page 1705-1722. USENIX Association, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 16Gb 1.2V 3.2Gb/s/pin DDR4 SDRAM with improved power distribution and repair strategy., , , , , , , , , and 15 other author(s). ISSCC, page 212-214. IEEE, (2018)I know the shortened URLs you clicked on Twitter: inference attack using public click analytics and Twitter metadata., , and . WWW, page 1191-1200. International World Wide Web Conferences Steering Committee / ACM, (2013)Hacksaw: Hardware-Centric Kernel Debloating via Device Inventory and Dependency Analysis., , and . CCS, page 1994-2008. ACM, (2023)Route Optimization with Additional Destination-Information in Mobile Networks., , , and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 286-295. Springer, (2007)Four-bar linkage-based tool changing mechanism and torque compensation based on dynamic characteristics., , , and . URAI, page 326-327. IEEE, (2016)Robust OFDM-Based Synchronization Against Very High Fractional CFO and Time-Varying Fading., and . IEEE Syst. J., 14 (3): 4047-4058 (2020)Two Alternative Registration and Paging Schemes for Supporting Idle Mode in IEEE 802.16e Wireless MAN., , , , and . VTC Fall, page 1-5. IEEE, (2006)Tree-based modeling of prosodic phrasing and segmental duration for Korean TTS systems., and . Speech Commun., 28 (4): 283-300 (1999)WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream., and . IEEE Trans. Dependable Secur. Comput., 10 (3): 183-195 (2013)An Open-World Novelty Generator for Authoring Reinforcement Learning Environment of Standardized Toolkits., , , , , and . MIWAI, volume 12832 of Lecture Notes in Computer Science, page 27-33. Springer, (2021)