Search for persons
X
?
NOMS 2024-2024 IEEE Network Operations and Management Symposium ,
1
ERAFL: Efficient Resource Allocation for Federated Learning..:
, In:
?
2023 IEEE Security and Privacy Workshops (SPW) ,
2
HoneyKube: Designing and Deploying a Microservices-based We..:
, In:
?
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) ,
3
AoT - Attack on Things: A security analysis of IoT firmware..:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
4
Divak: Non-invasive Characterization of Out-of-Bounds Write..:
, In:
?
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE) ,
5
Columbus: Android App Testing Through Systematic Callback E..:
, In:
?
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses ,
7
Shimware: Toward Practical Security Retrofitting for Monoli..:
, In:
?
Proceedings of the 38th Annual Computer Security Applications Conference ,
8
Stepping out of the MUD: Contextual threat information for ..:
, In:
?
2022 IEEE Symposium on Security and Privacy (SP) ,
10
DEEPCASE: Semi-Supervised Contextual Analysis of Security E..:
, In:
?
2022 IEEE 8th World Forum on Internet of Things (WF-IoT) ,
11
Federated Lab (FedLab): An Open-source Distributed Platform..:
, In:
?
Proceedings of the 2022 on Cloud Computing Security Workshop ,
12
Detecting Anomalous Misconfigurations in AWS Identity and A..:
, In:
?
Proceedings of the 2022 on Cloud Computing Security Workshop ,
13
Contextualizing System Calls in Containers for Anomaly-Base..:
, In:
?
2021 IEEE Symposium on Security and Privacy (SP) ,
14
Diane: Identifying Fuzzing Triggers in Apps to Generate Und..:
, In:
?
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
15