Cited By
View all- Sekar RHamlen KLu L(2020)Information FlowProceedings of the 2020 ACM Workshop on Forming an Ecosystem Around Software Transformation10.1145/3411502.3418421(1-2)Online publication date: 13-Nov-2020
- Hossain MSheikhi SSekar R(2020)Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics2020 IEEE Symposium on Security and Privacy (SP)10.1109/SP40000.2020.00064(1139-1155)Online publication date: May-2020
- Mao WCai ZTowsley DFeng QGuan X(2017)Security importance assessment for system objects and malware detectionComputers and Security10.1016/j.cose.2017.02.00968:C(47-68)Online publication date: 1-Jul-2017
- Show More Cited By