Author of the publication

A First Step Toward Network Security Virtualization: From Concept To Prototype.

, , and . IEEE Trans. Information Forensics and Security, 10 (10): 2236-2249 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EFFORT: Efficient and effective bot malware detection., , and . INFOCOM, page 2846-2850. IEEE, (2012)Model checking invariant security properties in OpenFlow., , , , and . ICC, page 1974-1979. IEEE, (2013)AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization., , , and . ICDCS, page 112-123. IEEE Computer Society, (2013)UIPicker: User-Input Privacy Identification in Mobile Applications., , , , , and . USENIX Security Symposium, page 993-1008. USENIX Association, (2015)Uncovering HTTP Header Inconsistencies and the Impact on Desktop/Mobile Websites., , and . WWW, page 247-256. ACM, (2018)GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment., , , and . RAID, volume 8688 of Lecture Notes in Computer Science, page 22-45. Springer, (2014)FineDroid: Enforcing Permissions with System-Wide Application Execution Context., , , and . SecureComm, volume 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-22. Springer, (2015)Cross-Analysis of Botnet Victims: New Insights and Implications., , and . RAID, volume 6961 of Lecture Notes in Computer Science, page 242-261. Springer, (2011)CATS: Characterizing automation of Twitter spammers., , , , and . COMSNETS, page 1-10. IEEE, (2013)NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System., and . NDSS, The Internet Society, (2013)