Search for persons
X
?
ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology ,
1
Zeek-Osquery: Host-Network Correlation for Advanced Monitor..:
, In:
?
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization ,
2
Viable Protection of High-Performance Networks through Hard..:
, In:
?
Proceedings of the 32nd Annual Conference on Computer Security Applications ,
3
Spicy : a unified deep packet inspection framework for s..:
, In:
?
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining ,
4
On the Reliability of Profile Matching Across Large Online ..:
, In:
?
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security ,
5
Beyond Pattern Matching : A Concurrency Model for Statef..:
, In:
?
Proceedings of the 30th Annual Computer Security Applications Conference ,
6
Through the eye of the PLC : semantic security monitorin..:
, In:
?
Proceedings of the 2014 Conference on Internet Measurement Conference ,
7
HILTI : an Abstract Execution Environment for Deep, Stat..:
, In:
?
Proceedings of the 22nd international conference on World Wide Web ,
8
Here's my cert, so trust me, maybe? : understanding TLS ..:
, In:
?
Proceedings of the 29th Annual Computer Security Applications Conference ,
9
No attack necessary : the surprising dynamics of SSL tru..:
, In:
?
Proceedings of the 22nd international conference on World Wide Web ,
10
Exploiting innocuous activity for correlating users across ..:
, In:
?
11
Recent advances in intrusion detection
14th international symposium, RAID 2011, Menlo Park, CA, US...
Lecture notes in computer science ; 6961
?
Proceedings of the 2011 New Security Paradigms Workshop ,
12
Sherlock holmes' evil twin : on the impact of global inf..:
, In:
?
13
Recent advances in intrusion detection
13th international symposium, RAID 2010, Ottawa, Ontario, C...
Lecture notes in computer science ; 6307