Author of the publication

Dressed up: Baiting Attackers through Endpoint Service Projection.

, , , and . SDN-NFV@CODASPY, page 23-28. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Feature Robustness for Windows Malware Family Classification., , , and . ICCCN, page 1-10. IEEE, (2022)Improving cybersecurity hygiene through JIT patching., and . ESEC/SIGSOFT FSE, page 1421-1432. ACM, (2020)Detecting Malicious Exploit Kits using Tree-based Similarity Searches., , , , , , and . CODASPY, page 255-266. ACM, (2016)Cross-Stack Threat Sensing for Cyber Security and Resilience., , , and . DSN Workshops, page 18-21. IEEE Computer Society, (2018)Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire., , , and . NDSS, The Internet Society, (2016)Dressed up: Baiting Attackers through Endpoint Service Projection., , , and . SDN-NFV@CODASPY, page 23-28. ACM, (2018)Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files., , , and . CCWC, page 745-751. IEEE, (2022)Toward Efficient Querying of Compressed Network Payloads., , , and . USENIX ATC, page 113-124. USENIX Association, (2012)Using Context to Improve Network-based Exploit Kit Detection.. University of North Carolina, Chapel Hill, USA, (2016)base-search.net (ftcarolinadr:cdr.lib.unc.edu:dz010q790).POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality., , , and . CCS, page 2523-2525. ACM, (2017)