Author of the publication

PracExtractor: Extracting Configuration Good Practices from Manuals to Detect Server Misconfigurations.

, , , , and . USENIX Annual Technical Conference, page 265-280. USENIX Association, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flexible and Extensible Runtime Verification for Java (Extended Version)., , and . Int. J. Softw. Eng. Knowl. Eng., 25 (9-10): 1595-1610 (2015)A hybrid time MILP model for the pump scheduling of multi-product pipelines based on the rigorous description of the pipeline hydraulic loss changes., , , , , , and . Comput. Chem. Eng., (2019)Detecting Access Control Misconfigurations with Change Validation.. University of California, San Diego, USA, (2021)Towards Continuous Access Control Validation and Forensics., , , , , , , , , and . CCS, page 113-129. ACM, (2019)A Virtualization Based Monitoring System for Mini-intrusive Live Forensics., , , , and . Int. J. Parallel Program., 43 (3): 455-471 (2015)Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model., , , , , , and . USENIX Security Symposium, page 751-768. USENIX Association, (2021)PYLIVE: On-the-Fly Code Change for Python-based Online Services., , , and . USENIX Annual Technical Conference, page 349-363. USENIX Association, (2021)ForenVisor: A Tool for Acquiring and Preserving Reliable Data in Cloud Live Forensics., , , , , and . IEEE Trans. Cloud Comput., 5 (3): 443-456 (2017)PracExtractor: Extracting Configuration Good Practices from Manuals to Detect Server Misconfigurations., , , , and . USENIX Annual Technical Conference, page 265-280. USENIX Association, (2020)Flexible and Extensible Runtime Verification for Java., , and . SEKE, page 595-600. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2015)