Publications
Found 773 results
Author Title [ Type] Year Filters: First Letter Of Last Name is P [Clear All Filters]
(2011).
Detecting and Characterizing Lateral Phishing at Scale.
Proceedings of USENIX Security Symposium.
(2019). Detecting Backdoors.
Proceedings of the Ninth USENIX Security Symposium.
(2000). Detecting DNS Root Manipulation.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016).
(2009).
(2013). Detecting Stepping Stones.
Proceedings of the Ninth USENIX Security Symposium.
(2000). Detection and Compensation of Sensor Malfunction in Time Delay Based Direction of Arrival Estimation.
Proceedings of IEEE ISCAS.
(2004). Detection and Compensation of Sensor Malfunction in Time Delay Based Direction of Arrival Estimation.
Proceedings of IEEE ISCAS.
(2004). Detector Discovery in the Wild: Joint Multiple Instance and Representation Learning.
The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2883-2891.
(2015).
(2014).
(2012). Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-Engineering.
621-634.
(2009). Dissecting DNS Stakeholders in Mobile Networks.
Proceedings of CoNEXT.
(2017).
(2013). Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes.
Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).
(2016). Do You See What I See? Differential Treatment of Anonymous Users.
Proceedings of the Network and Distributed System Security Symposium (NDSS).
(2016).
(2009). Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection.
Proceedings of the 15th USENIX Security Symposium (Security '06).
(2006).
(2008).
(2009).
(2008).
(2012). Enabling a permanent revolution in internet architecture.
Proceedings of the ACM Special Interest Group on Data Communication SIGCOMM '19.
(2019).
(2007).