Author of the publication

Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System.

, , , , , , , , and . ACM Conference on Computer and Communications Security, page 787-802. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multi-Agent Reinforcement Learning Approach for Dynamic Information Flow Tracking Games for Advanced Persistent Threats., , , , , and . CoRR, (2020)Stochastic Dynamic Information Flow Tracking game using supervised learning for detecting advanced persistent threats., , , , , and . Autom., (January 2024)Stochastic Dynamic Information Flow Tracking Game using Supervised Learning for Detecting Advanced Persistent Threats., , , , , and . CoRR, (2020)Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem., , , , , and . CCS, page 2975-2988. ACM, (2022)Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach., , , , , , and . CoRR, (2020)Stochastic Dynamic Information Flow Tracking Game with Reinforcement Learning., , , , , and . GameSec, volume 11836 of Lecture Notes in Computer Science, page 417-438. Springer, (2019)Learning Equilibria in Stochastic Information Flow Tracking Games with Partial Knowledge., , , , , , and . CDC, page 4053-4060. IEEE, (2019)Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System., , , , , , , , and . ACM Conference on Computer and Communications Security, page 787-802. ACM, (2020)Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness., , , , , and . ACSAC, page 210-221. ACM, (2018)Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking., , , , , , , and . USENIX Security Symposium, page 1705-1722. USENIX Association, (2018)