Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hit 'em where it hurts: a live security exercise on cyber situational awareness., , , , , , , and . ACSAC, page 51-61. ACM, (2011)CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms., , , and . SAC, page 1865-1870. ACM, (2010)Using Static Program Analysis to Aid Intrusion Detection., , , and . DIMVA, volume 4064 of Lecture Notes in Computer Science, page 17-36. Springer, (2006)Taxonomist: Application Detection Through Rich Monitoring Data., , , , , , and . Euro-Par, volume 11014 of Lecture Notes in Computer Science, page 92-105. Springer, (2018)Runtime Performance Anomaly Diagnosis in Production HPC Systems Using Active Learning., , , , , , , , and . IEEE Trans. Parallel Distributed Syst., 35 (4): 693-706 (April 2024)Nile: A Programmable Monitoring Coprocessor., , , , and . IEEE Comput. Archit. Lett., 17 (1): 92-95 (2018)Panorama: capturing system-wide information flow for malware detection and analysis., , , , and . CCS, page 116-127. ACM, (2007)Proctor: A Semi-Supervised Performance Anomaly Diagnosis Framework for Production HPC Systems., , , , , , , , and . ISC, volume 12728 of Lecture Notes in Computer Science, page 195-214. Springer, (2021)HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing., , , , , , and . NDSS, The Internet Society, (2020)COMPA: Detecting Compromised Accounts on Social Networks., , , and . NDSS, The Internet Society, (2013)