Author of the publication

Redefining web browser principals with a Configurable Origin Policy.

, , , , and . DSN, page 1-12. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting and characterizing social spam campaigns., , , , , and . ACM Conference on Computer and Communications Security, page 681-683. ACM, (2010)Towards a Timely Causality Analysis for Enterprise Security., , , , , , , and . NDSS, The Internet Society, (2018)NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis., , , , , , , , , and . CCS, page 1324-1337. ACM, (2018)TINET: Learning Invariant Networks via Knowledge Transfer., , , , , , and . KDD, page 1890-1899. ACM, (2018)Collaborative Alert Ranking for Anomaly Detection., , , , , , and . CIKM, page 1987-1995. ACM, (2018)Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security., , , , and . AsiaCCS, page 8-9. ACM, (2012)High Fidelity Data Reduction for Big Data Security Dependency Analyses., , , , , , , , and . ACM Conference on Computer and Communications Security, page 504-516. ACM, (2016)Measurement and Diagnosis of Address Misconfigured P2P Traffic., , , and . INFOCOM, page 1091-1099. IEEE, (2010)Discover and Tame Long-running Idling Processes in Enterprise Systems., , , , , , , and . AsiaCCS, page 543-554. ACM, (2015)WebShield: Enabling Various Web Defense Techniques without Client Side Modifications., , , , , , and . NDSS, The Internet Society, (2011)