Author of the publication

Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities.

, , , , , , and . NDSS, The Internet Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Checkpointing and Its Applications., , , , and . FTCS, page 22-31. IEEE Computer Society, (1995)Integrating Checkpointing with Transaction Processing., , , and . FTCS, page 304-308. IEEE Computer Society, (1997)Towards Dependable Home Networking: An Experience Report., , , , and . DSN, page 43-48. IEEE Computer Society, (2000)Classifying and alleviating the communication overheads in matrix computations on large-scale NUMA multiprocessors., , and . Journal of Systems and Software, 44 (1): 17-29 (1998)Clustered affinity scheduling on large-scale NUMA multiprocessors., , and . Journal of Systems and Software, 39 (1): 61-70 (1997)Local Cluster First Load Sharing Policy for Heterogeneous Clusters.. J. Inf. Sci. Eng., 23 (2): 497-510 (2007)Quantitative NMR spectroscopy by matrix pencil methods., , and . Int. J. Imaging Systems and Technology, 4 (3): 201-206 (1992)Managing the Aladdin Home Networking System: An Experience Report.. SEUS, page 25-29. IEEE Computer Society, (2005)STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support., , , , , , and . LISA, page 159-172. USENIX, (2003)Combining High Level Symptom Descriptions and Low Level State Information for Configuration Fault Diagnosis., , , and . LISA, page 151-158. USENIX, (2004)