default search action
Vinod Yegneswaran
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Jinwoo Kim, Minjae Seo, Seungsoo Lee, Jaehyun Nam, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu, Seungwon Shin:
Enhancing security in SDN: Systematizing attacks and defenses from a penetration perspective. Comput. Networks 241: 110203 (2024) - [c76]Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Ashish Gehani, Zhiqiang Lin:
5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service. NDSS 2024 - [c75]Nguyen Phong Hoang, Jakub Dalek, Masashi Crete-Nishihata, Nicolas Christin, Vinod Yegneswaran, Michalis Polychronakis, Nick Feamster:
GFWeb: Measuring the Great Firewall's Web Censorship at Scale. USENIX Security Symposium 2024 - 2023
- [j13]Jinwoo Kim, Yeonkeun Kim, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin, Taejune Park:
Extended data plane architecture for in-network security services in software-defined networks. Comput. Secur. 124: 102976 (2023) - [j12]Jaehyun Nam, Seungsoo Lee, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin:
Secure Inter-Container Communications Using XDP/eBPF. IEEE/ACM Trans. Netw. 31(2): 934-947 (2023) - [j11]Mohannad Alhanahnah, Shiqing Ma, Ashish Gehani, Gabriela F. Ciocarlie, Vinod Yegneswaran, Somesh Jha, Xiangyu Zhang:
autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning. IEEE Trans. Software Eng. 49(4): 2761-2775 (2023) - [c74]Muaz Ali, Muhammad Muzammil, M. Faraz Karim, Ayesha Naeem, Rukhshan Haroon, Muhammad Haris, Huzaifah Nadeem, Waseem Sabir, Fahad Shaon, Fareed Zaffar, Vinod Yegneswaran, Ashish Gehani, Sazzadur Rahaman:
SoK: A Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their Compositions. ESORICS (4) 2023: 229-249 - [c73]Kaiyu Hou, Dhiraj Saharia, Vinod Yegneswaran, Phillip A. Porras:
LANTERN: Layered Adaptive Network Telemetry Collection for Programmable Dataplanes. EuroP4@CoNEXT 2023: 1-7 - [c72]Prakhar Sharma, Vinod Yegneswaran:
PROSPER: Extracting Protocol Specifications Using Large Language Models. HotNets 2023: 41-47 - [c71]Jacob Alexander Markson Brown, Xi Jiang, Van Hong Tran, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Nick Feamster, Prateek Mittal, Vinod Yegneswaran:
Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning. KDD 2023: 3750-3761 - [c70]Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Zhiqiang Lin:
Thwarting Smartphone SMS Attacks at the Radio Interface Layer. NDSS 2023 - [c69]Abderrahmen Amich, Birhanu Eshete, Vinod Yegneswaran, Nguyen Phong Hoang:
DeResistor: Toward Detection-Resistant Probing for Evasion of Internet Censorship. USENIX Security Symposium 2023: 2617-2633 - [i7]Jacob Alexander Markson Brown, Xi Jiang, Van Hong Tran, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Nick Feamster, Prateek Mittal, Vinod Yegneswaran:
Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning. CoRR abs/2302.02031 (2023) - 2022
- [j10]Seungsoo Lee, Seungwon Woo, Jinwoo Kim, Jaehyun Nam, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin:
A Framework for Policy Inconsistency Detection in Software-Defined Networks. IEEE/ACM Trans. Netw. 30(3): 1410-1423 (2022) - [c68]Kaiyu Hou, Sen Lin, Yan Chen, Vinod Yegneswaran:
QFaaS: accelerating and securing serverless cloud networks with QUIC. SoCC 2022: 240-256 - [c67]Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Zhiqiang Lin:
A fine-grained telemetry stream for security services in 5G open radio access networks. EmergingWireless@CoNEXT 2022: 18-23 - [c66]Nik Sultana, Deborah Shands, Vinod Yegneswaran:
A case for remote attestation in programmable dataplanes. HotNets 2022: 122-129 - [c65]Mashal Abbas, Shahpar Khan, Abdul Monum, Fareed Zaffar, Rashid Tahir, David M. Eyers, Hassaan Irshad, Ashish Gehani, Vinod Yegneswaran, Thomas Pasquier:
PACED: Provenance-based Automated Container Escape Detection. IC2E 2022: 261-272 - [c64]Abderrahmen Amich, Birhanu Eshete, Vinod Yegneswaran:
Adversarial Detection of Censorship Measurements. WPES@CCS 2022: 139-143 - 2021
- [j9]Hyeonseong Jo, Jinwoo Kim, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin:
GapFinder: Finding Inconsistency of Security Information From Unstructured Text. IEEE Trans. Inf. Forensics Secur. 16: 86-99 (2021) - [j8]Jinwoo Kim, Jaehyun Nam, Suyeol Lee, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin:
BottleNet: Hiding Network Bottlenecks Using SDN-Based Topology Deception. IEEE Trans. Inf. Forensics Secur. 16: 3138-3153 (2021) - [j7]Hassaan Irshad, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Kyu Hyung Lee, Jignesh M. Patel, Somesh Jha, Yonghwi Kwon, Dongyan Xu, Xiangyu Zhang:
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection. IEEE Trans. Inf. Forensics Secur. 16: 4363-4376 (2021) - [c63]Kaiyu Hou, Sen Lin, Yan Chen, Vinod Yegneswaran:
Accelerate and secure serverless networks with QUIC. CoNEXT 2021: 477-478 - [c62]Le Yu, Shiqing Ma, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, Dongyan Xu, Vincent E. Urias, Han Wei Lin, Gabriela F. Ciocarlie, Vinod Yegneswaran, Ashish Gehani:
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation. NDSS 2021 - [c61]Xutong Chen, Hassaan Irshad, Yan Chen, Ashish Gehani, Vinod Yegneswaran:
CLARION: Sound and Clear Provenance Tracking for Microservice Deployments. USENIX Security Symposium 2021: 3989-4006 - [i6]Prakhar Sharma, Phillip A. Porras, Steven Cheung, James Carpenter, Vinod Yegneswaran:
Scalable Microservice Forensics and Stability Assessment Using Variational Autoencoders. CoRR abs/2104.13193 (2021) - 2020
- [j6]Seungsoo Lee, Jinwoo Kim, Seungwon Woo, Changhoon Yoon, Sandra Scott-Hayward, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin:
A comprehensive security assessment framework for software-defined networks. Comput. Secur. 91: 101720 (2020) - [j5]Heedo Kang, Vinod Yegneswaran, Shalini Ghosh, Phillip A. Porras, Seungwon Shin:
Automated Permission Model Generation for Securing SDN Control-Plane. IEEE Trans. Inf. Forensics Secur. 15: 1668-1682 (2020) - [c60]Seungsoo Lee, Seungwon Woo, Jinwoo Kim, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin:
AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks. INFOCOM 2020: 1788-1797 - [c59]Jaehyun Nam, Seungsoo Lee, Hyunmin Seo, Phil Porras, Vinod Yegneswaran, Seungwon Shin:
BASTION: A Security Enforcement Network Stack for Container Networks. USENIX ATC 2020: 81-95 - [c58]Vasudevan Nagendra, Arani Bhattacharya, Vinod Yegneswaran, Amir Rahmati, Samir Ranjan Das:
An Intent-Based Automation Framework for Securing Dynamic Consumer IoT Infrastructures. WWW 2020: 1625-1636 - [i5]Jianwei Huang, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
On the Privacy and Integrity Risks of Contact-Tracing Applications. CoRR abs/2012.03283 (2020)
2010 – 2019
- 2019
- [j4]Jaehyun Nam, Hyeonseong Jo, Yeonkeun Kim, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin:
Operator-Defined Reconfigurable Network OS for Software-Defined Networks. IEEE/ACM Trans. Netw. 27(3): 1206-1219 (2019) - [c57]Vasudevan Nagendra, Vinod Yegneswaran, Phillip A. Porras, Samir R. Das:
Coordinated dataflow protection for ultra-high bandwidth science networks. ACSAC 2019: 568-583 - [c56]Nik Sultana, Achala Rao, Zihao Jin, Pardis Pashakhanloo, Henry Zhu, Vinod Yegneswaran, Boon Thau Loo:
Trace-based Behaviour Analysis of Network Servers. CNSM 2019: 1-5 - [c55]Taejune Park, Yeonkeun Kim, Vinod Yegneswaran, Phillip A. Porras, Zhaoyan Xu, KyoungSoo Park, Seungwon Shin:
DPX: Data-Plane eXtensions for SDN Security Service Instantiation. DIMVA 2019: 415-437 - [c54]Mathieu Barré, Ashish Gehani, Vinod Yegneswaran:
Mining Data Provenance to Detect Advanced Persistent Threats. TaPP 2019 - [i4]Anh T. Pham, Shalini Ghosh, Vinod Yegneswaran:
Data Masking with Privacy Guarantees. CoRR abs/1901.02185 (2019) - [i3]Vasudevan Nagendra, Arani Bhattacharya, Vinod Yegneswaran, Amir Rahmati, Samir R. Das:
VISCR: Intuitive & Conflict-free Automation for Securing the Dynamic Consumer IoT Infrastructures. CoRR abs/1907.13288 (2019) - 2018
- [c53]Jaehyun Nam, Hyeonseong Jo, Yeonkeun Kim, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin:
Barista: An Event-centric NOS Composition Framework for Software-Defined Networks. INFOCOM 2018: 980-988 - [c52]Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran:
MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation. NDSS 2018 - [c51]Adil Ahmad, Faizan Ahmad, Lei Wei, Vinod Yegneswaran, Fareed Zaffar:
Detecting and Defending Against Certificate Attacks with Origin-Bound CAPTCHAs. SecureComm (2) 2018: 291-308 - [c50]Heedo Kang, Seungwon Shin, Vinod Yegneswaran, Shalini Ghosh, Phillip A. Porras:
AEGIS: An Automated Permission Generation and Verification System for SDNs. SecSoN@SIGCOMM 2018: 20-26 - [c49]Amir Asiaee T., Hardik Goel, Shalini Ghosh, Vinod Yegneswaran, Arindam Banerjee:
Time Series Deinterleaving of DNS Traffic. IEEE Symposium on Security and Privacy Workshops 2018: 103-108 - [c48]Shiqing Ma, Juan Zhai, Yonghwi Kwon, Kyu Hyung Lee, Xiangyu Zhang, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Dongyan Xu, Somesh Jha:
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking. USENIX ATC 2018: 241-254 - [i2]Shalini Ghosh, Amaury Mercier, Dheeraj Pichapati, Susmit Jha, Vinod Yegneswaran, Patrick Lincoln:
Trusted Neural Networks for Safety-Constrained Autonomous Control. CoRR abs/1805.07075 (2018) - [i1]Amir Asiaee T., Hardik Goel, Shalini Ghosh, Vinod Yegneswaran, Arindam Banerjee:
Time Series Deinterleaving of DNS Traffic. CoRR abs/1807.05650 (2018) - 2017
- [j3]Changhoon Yoon, Seungsoo Lee, Heedo Kang, Taejune Park, Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
Flow Wars: Systemizing the Attack Surface and Defenses in Software-Defined Networks. IEEE/ACM Trans. Netw. 25(6): 3514-3530 (2017) - [c47]Shalini Ghosh, Phillip A. Porras, Vinod Yegneswaran, Ken Nitz, Ariyam Das:
ATOL: A Framework for Automated Analysis and Categorization of the Darkweb Ecosystem. AAAI Workshops 2017 - [c46]Changhoon Yoon, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Heedo Kang, Martin W. Fong, Brian O'Connor, Thomas Vachuska:
A Security-Mode for Carrier-Grade SDN Controllers. ACSAC 2017: 461-473 - [c45]Jaehyun Nam, Hyeonseong Jo, Yeonkeun Kim, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin:
Bridging the architectural gap between NOS design principles in software-defined networks. SoCC 2017: 637 - [c44]Seunghyeon Lee, Jinwoo Kim, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran:
Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks. DSN 2017: 249-260 - [c43]Vasudevan Nagendra, Vinod Yegneswaran, Phillip A. Porras:
Securing Ultra-High-Bandwidth Science DMZ Networks with Coordinated Situational Awareness. HotNets 2017: 22-28 - [c42]Shalini Ghosh, Ariyam Das, Phillip A. Porras, Vinod Yegneswaran, Ashish Gehani:
Automated Categorization of Onion Sites for Analyzing the Darkweb Ecosystem. KDD 2017: 1793-1802 - [c41]Seungsoo Lee, Changhoon Yoon, Chanhee Lee, Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras:
DELTA: A Security Assessment Framework for Software-Defined Networks. NDSS 2017 - [e2]Robert H. Deng, Jian Weng, Kui Ren, Vinod Yegneswaran:
Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 198, Springer 2017, ISBN 978-3-319-59607-5 [contents] - 2016
- [j2]Hongyu Gao, Vinod Yegneswaran, Jian Jiang, Yan Chen, Phillip A. Porras, Shalini Ghosh, Hai-Xin Duan:
Reexamining DNS From a Global Recursive Resolver Perspective. IEEE/ACM Trans. Netw. 24(1): 43-57 (2016) - [c40]Xiang Pan, Vinod Yegneswaran, Yan Chen, Phillip A. Porras, Seungwon Shin:
HogMap: Using SDNs to Incentivize Collaborative Security Monitoring. SDN-NFV@CODASPY 2016: 7-12 - 2015
- [c39]Birhanu Eshete, Abeer Alhuzali, Maliheh Monshizadeh, Phillip A. Porras, Venkat N. Venkatakrishnan, Vinod Yegneswaran:
EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration. NDSS 2015 - [c38]Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim, Xiangyu Zhang, Dongyan Xu, Vinod Yegneswaran, John Qian:
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions. NDSS 2015 - [c37]Phillip A. Porras, Steven Cheung, Martin W. Fong, Keith Skinner, Vinod Yegneswaran:
Securing the Software Defined Network Control Layer. NDSS 2015 - [c36]Chao Yang, Guangliang Yang, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, Guofei Gu:
Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps. SecureComm 2015: 58-77 - [e1]Bhavani Thuraisingham, XiaoFeng Wang, Vinod Yegneswaran:
Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 164, Springer 2015, ISBN 978-3-319-28864-2 [contents] - 2014
- [c35]Seungwon Shin, YongJoo Song, Taekyung Lee, Sangho Lee, Jaewoong Chung, Phillip A. Porras, Vinod Yegneswaran, Jiseong Noh, Brent ByungHoon Kang:
Rosemary: A Robust, Secure, and High-performance Network Operating System. CCS 2014: 78-89 - [c34]Chao Yang, Zhaoyan Xu, Guofei Gu, Vinod Yegneswaran, Phillip A. Porras:
DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications. ESORICS (1) 2014: 163-182 - [c33]Jeroen Massar, Ian Mason, Linda Briesemeister, Vinod Yegneswaran:
JumpBox - A Seamless Browser Proxy for Tor Pluggable Transports. SecureComm (1) 2014: 563-581 - [c32]Christopher Connolly, Patrick Lincoln, Ian Mason, Vinod Yegneswaran:
TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography. FOCI 2014 - 2013
- [c31]Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks. CCS 2013: 413-424 - [c30]Sooel Son, Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
Model checking invariant security properties in OpenFlow. ICC 2013: 1974-1979 - [c29]Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, Guofei Gu, Mabry Tyson:
FRESCO: Modular Composable Security Services for Software-Defined Networks. NDSS 2013 - [c28]Hongyu Gao, Vinod Yegneswaran, Yan Chen, Phillip A. Porras, Shalini Ghosh, Jian Jiang, Hai-Xin Duan:
An empirical reexamination of global DNS behavior. SIGCOMM 2013: 267-278 - 2012
- [c27]Matthew Fredrikson, Richard Joiner, Somesh Jha, Thomas W. Reps, Phillip A. Porras, Hassen Saïdi, Vinod Yegneswaran:
Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement. CAV 2012: 548-563 - [c26]Zachary Weinberg, Jeffrey Wang, Vinod Yegneswaran, Linda Briesemeister, Steven Cheung, Frank Wang, Dan Boneh:
StegoTorus: a camouflage proxy for the Tor anonymity system. CCS 2012: 109-120 - [c25]Chao Yang, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu:
Detecting money-stealing apps in alternative Android markets. CCS 2012: 1034-1036 - [c24]Yinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen:
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks. NDSS 2012 - [c23]Phillip A. Porras, Seungwon Shin, Vinod Yegneswaran, Martin W. Fong, Mabry Tyson, Guofei Gu:
A security enforcement kernel for OpenFlow networks. HotSDN@SIGCOMM 2012: 121-126 - [c22]Patrick Lincoln, Ian Mason, Phillip A. Porras, Vinod Yegneswaran, Zachary Weinberg, Jeroen Massar, William Allen Simpson, Paul Vixie, Dan Boneh:
Bootstrapping Communications into an Anti-Censorship System. FOCI 2012 - 2011
- [j1]Jin-yi Cai, Vinod Yegneswaran, Chris Alfeld, Paul Barford:
Honeynet games: a game theoretic approach to defending network monitors. J. Comb. Optim. 22(3): 305-324 (2011) - [c21]Lakshmanan Nataraj, Vinod Yegneswaran, Phillip A. Porras, Jian Zhang:
A comparative assessment of malware classification using binary texture analysis and dynamic analysis. AISec 2011: 21-30 - [c20]Yinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen:
Poster: a path-cutting approach to blocking XSS worms in social web networks. CCS 2011: 745-748 - 2010
- [c19]Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee:
BLADE: an attack-agnostic approach for preventing drive-by malware infections. CCS 2010: 440-450 - [c18]Phillip A. Porras, Hassen Saïdi, Vinod Yegneswaran:
An Analysis of the iKee.B iPhone Botnet. MobiSec 2010: 141-152 - [p2]Paul Barford, Yan Chen, Anup Goyal, Zhichun Li, Vern Paxson, Vinod Yegneswaran:
Employing Honeynets For Network Situational Awareness. Cyber Situational Awareness 2010: 71-102
2000 – 2009
- 2009
- [c17]Guofei Gu, Vinod Yegneswaran, Phillip A. Porras, Jennifer Stoll, Wenke Lee:
Active Botnet Probing to Identify Obscure Command and Control Channels. ACSAC 2009: 241-253 - [c16]Jin-yi Cai, Vinod Yegneswaran, Chris Alfeld, Paul Barford:
An Attacker-Defender Game for Honeynets. COCOON 2009: 7-16 - [c15]Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee:
BLADE: Slashing the Invisible Channel of Drive-by Download Malware. RAID 2009: 350-352 - [c14]Ikpeme Erete, Vinod Yegneswaran, Phillip A. Porras:
ALICE@home: Distributed Framework for Detecting Malicious Sites. RAID 2009: 362-364 - [c13]Zhaosheng Zhu, Vinod Yegneswaran, Yan Chen:
Using Failure Information Analysis to Detect Enterprise Zombies. SecureComm 2009: 185-206 - 2008
- [c12]Monirul Islam Sharif, Vinod Yegneswaran, Hassen Saïdi, Phillip A. Porras, Wenke Lee:
Eureka: A Framework for Enabling Static Malware Analysis. ESORICS 2008: 481-500 - 2007
- [c11]Guofei Gu, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, Wenke Lee:
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. USENIX Security Symposium 2007 - [p1]Paul Barford, Vinod Yegneswaran:
An Inside Look at Botnets. Malware Detection 2007: 171-191 - 2006
- [c10]Joel Sommers, Vinod Yegneswaran, Paul Barford:
Recent Advances in Network Intrusion Detection System Tuning. CISS 2006: 1490-1495 - [c9]Vikas Garg, Vinod Yegneswaran, Paul Barford:
Improving NIDS Performance Through Hardware-based Connection Filtering. ICC 2006: 2183-2188 - [c8]Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, Raghu Ramakrishnan:
Toward a Query Language for Network Attack Data. ICDE Workshops 2006: 28 - [c7]Lei Chen, Raghu Ramakrishnan, Paul Barford, Bee-Chung Chen, Vinod Yegneswaran:
Composite Subset Measures. VLDB 2006: 403-414 - 2005
- [c6]Vinod Yegneswaran, Jonathon T. Giffin, Paul Barford, Somesh Jha:
An Architecture for Generating Semantic Aware Signatures. USENIX Security Symposium 2005 - 2004
- [c5]Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, Larry L. Peterson:
Characteristics of internet background radiation. Internet Measurement Conference 2004: 27-40 - [c4]Joel Sommers, Vinod Yegneswaran, Paul Barford:
A framework for malicious workload generation. Internet Measurement Conference 2004: 82-87 - [c3]Vinod Yegneswaran, Paul Barford, Somesh Jha:
Global Intrusion Detection in the DOMINO Overlay System. NDSS 2004 - [c2]Vinod Yegneswaran, Paul Barford, David Plonka:
On the Design and Use of Internet Sinks for Network Abuse Monitoring. RAID 2004: 146-165 - 2003
- [c1]Vinod Yegneswaran, Paul Barford, Johannes Ullrich:
Internet intrusions: global characteristics and prevalence. SIGMETRICS 2003: 138-147
Coauthor Index
aka: Phil Porras
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint