Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Dumitras, Tudor
add a person with the name Dumitras, Tudor
 

Other publications of authors with the same name

The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching., , , , and . IEEE Symposium on Security and Privacy, page 692-708. IEEE Computer Society, (2015)Peek-a-boo: Inferring program behaviors in a virtualized infrastructure without introspection., , , and . Computers & Security, (2018)SharkFin: Spatio-temporal mining of software adoption and penetration., , , , and . Social Netw. Analys. Mining, 4 (1): 240 (2014)Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State., , , , and . PAM, volume 10176 of Lecture Notes in Computer Science, page 113-125. Springer, (2017)Fault-Tolerant Middleware and the Magical 1%., and . Middleware, volume 3790 of Lecture Notes in Computer Science, page 431-441. Springer, (2005)Toward Semantic Cryptography APIs., , , and . SecDev, page 9-14. IEEE Computer Society, (2016)Ecotopia: An Ecological Framework for Change Management in Distributed Systems., , , and . WADS, volume 4615 of Lecture Notes in Computer Science, page 262-286. Springer, (2006)Shallow-Deep Networks: Understanding and Mitigating Network Overthinking., , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 3301-3310. PMLR, (2019)The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics., , , , and . ACM Conference on Computer and Communications Security, page 1118-1129. ACM, (2015)Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns., , , and . NDSS, The Internet Society, (2017)