Author of the publication

De-anonymizing Programmers via Code Stylometry

, , , , , , and . Proceedings of the 24th USENIX Conference on Security Symposium, page 255--270. (August 2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

De-anonymizing Programmers via Code Stylometry, , , , , , and . Proceedings of the 24th USENIX Conference on Security Symposium, page 255--270. (August 2015)Bridging the Semantic Gap: Human Factors in Anomaly-Based Intrusion Detection Systems.. Network Science and Cybersecurity, volume 55 of Advances in Information Security, Springer, (2014)Crafting adversarial input sequences for recurrent neural networks., , , and . MILCOM, page 49-54. IEEE, (2016)Source Code Authorship Attribution Using Long Short-Term Memory Based Networks., , , , and . ESORICS (1), volume 10492 of Lecture Notes in Computer Science, page 65-82. Springer, (2017)Identifying Key Cyber-Physical Terrain., and . IWSPA@CODASPY, page 23-28. ACM, (2017)Micro-signatures: The Effectiveness of Known Bad N-Grams for Network Anomaly Detection., and . FPS, volume 10128 of Lecture Notes in Computer Science, page 36-47. Springer, (2016)Grammatical Inference and Language Frameworks for LANGSEC., and . IEEE Symposium on Security and Privacy Workshops, page 88-98. IEEE Computer Society, (2015)Measuring and Improving the Effectiveness of Defense-in-Depth Postures., , and . ICSS, page 15-22. ACM, (2016)Clustering of Snort alerts to identify patterns and reduce analyst workload., and . MILCOM, page 1-6. IEEE, (2012)A Fast Kernel for Attributed Graphs., , , and . SDM, page 486-494. SIAM, (2016)