Author of the publication

HOLMES: Real-Time APT Detection through Correlation of Suspicious Information Flows.

, , , , and . IEEE Symposium on Security and Privacy, page 1137-1152. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OSTINATO: Cross-host Attack Correlation Through Attack Activity Similarity Detection., , , and . CoRR, (2023)An interoperation framework for secure collaboration among organizations., , and . SPRINGL, page 4-11. ACM, (2010)Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability., , , , , , and . SP, page 1059-1076. IEEE, (2023)Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective., , , and . ACM Trans. Cyber Phys. Syst., 7 (2): 15:1-15:33 (April 2023)POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting., , , and . CCS, page 1813-1830. ACM, (2019)Remote Check Truncation Systems: Vulnerability Analysis and Countermeasures., , , , and . IEEE Access, (2020)Digital Check Forgery Attacks on Client Check Truncation Systems., , , , and . Financial Cryptography, volume 8437 of Lecture Notes in Computer Science, page 3-20. Springer, (2014)AppSeer: discovering flawed interactions among Android components., , , and . A-Mobile@ASE, page 29-34. ACM, (2018)Location-Based Access Control Using Semantic Web Technologies., and . Geospatial Semantics and the Semantic Web, volume 12 of Semantic Web and Beyond: Computing for Human Experience, page 119-144. Springer, (2011)Leveraging Static Analysis Tools for Improving Usability of Memory Error Sanitization Compilers., , , , , and . QRS, page 323-334. IEEE, (2016)