Author of the publication

Before we knew it: an empirical study of zero-day attacks in the real world.

, and . ACM Conference on Computer and Communications Security, page 833-844. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Dumitras, Tudor
add a person with the name Dumitras, Tudor
 

Other publications of authors with the same name

The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching., , , , and . IEEE Symposium on Security and Privacy, page 692-708. IEEE Computer Society, (2015)SharkFin: Spatio-temporal mining of software adoption and penetration., , , , and . Social Netw. Analys. Mining, 4 (1): 240 (2014)Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State., , , , and . PAM, volume 10176 of Lecture Notes in Computer Science, page 113-125. Springer, (2017)Toward Semantic Cryptography APIs., , , and . SecDev, page 9-14. IEEE Computer Society, (2016)Peek-a-boo: Inferring program behaviors in a virtualized infrastructure without introspection., , , and . Computers & Security, (2018)Ecotopia: An Ecological Framework for Change Management in Distributed Systems., , , and . WADS, volume 4615 of Lecture Notes in Computer Science, page 262-286. Springer, (2006)Shallow-Deep Networks: Understanding and Mitigating Network Overthinking., , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 3301-3310. PMLR, (2019)Fault-Tolerant Middleware and the Magical 1%., and . Middleware, volume 3790 of Lecture Notes in Computer Science, page 431-441. Springer, (2005)The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics., , , , and . ACM Conference on Computer and Communications Security, page 1118-1129. ACM, (2015)Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns., , , and . NDSS, The Internet Society, (2017)