From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

High Fidelity Data Reduction for Big Data Security Dependency Analyses., , , , , , , , и . ACM Conference on Computer and Communications Security, стр. 504-516. ACM, (2016)ShadowReplica: efficient parallelization of dynamic data flow tracking., , , и . CCS, стр. 235-246. ACM, (2013)On Efficiency and Accuracy of Data Flow Tracking Systems.. Columbia University, USA, (2015)IntFlow: improving the accuracy of arithmetic error detection using information flow tracking., , , , и . ACSAC, стр. 416-425. ACM, (2014)Countering Malicious Processes with Process-DNS Association., , , , , , , , и . NDSS, The Internet Society, (2019)Evading Provenance-Based ML Detectors with Adversarial System Actions., , , , , , , и . USENIX Security Symposium, стр. 1199-1216. USENIX Association, (2023)SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression., , , , , и . USENIX Security Symposium, стр. 2987-3004. USENIX Association, (2021)This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage., , , , , , , , , и 1 other автор(ы). ACSAC, стр. 165-178. ACM, (2020)libdft: practical dynamic data flow tracking for commodity systems., , , и . VEE, стр. 121-132. ACM, (2012)A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security., , , , , , и . Proc. VLDB Endow., 12 (12): 1802-1805 (2019)