Folgen
Dongyan Xu
Dongyan Xu
Samuel Conte Professor of Computer Science and Director of CERIAS, Purdue University
Bestätigte E-Mail-Adresse bei purdue.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Stealthy malware detection and monitoring through VMM-based “out-of-the-box” semantic view reconstruction
X Jiang, X Wang, D Xu
ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-28, 2010
9682010
PROMISE: peer-to-peer media streaming using CollectCast
M Hefeeda, A Habib, B Botev, D Xu, B Bhargava
Proceedings of the eleventh ACM international conference on Multimedia, 45-54, 2003
6452003
Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing
R Riley, X Jiang, D Xu
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
4882008
On peer-to-peer media streaming
D Xu, M Hefeeda, S Hambrusch, B Bhargava
Proceedings 22nd International Conference on Distributed Computing Systems …, 2002
4632002
Automatic protocol format reverse engineering through context-aware monitored execution.
Z Lin, X Jiang, D Xu, X Zhang
NDSS 8, 1-15, 2008
3652008
Analysis of a CDN–P2P hybrid architecture for cost-effective streaming media distribution
D Xu, SS Kulkarni, C Rosenberg, HK Chai
Multimedia Systems 11, 383-399, 2006
3462006
Automatic reverse engineering of data structures from binary execution
Z Lin, X Zhang, D Xu
Proceedings of the 11th Annual Information Security Symposium, 1-1, 2010
3222010
Violin: Virtual internetworking on overlay infrastructure
X Jiang, D Xu
International Symposium on Parallel and Distributed Processing and …, 2004
2672004
Autonomic live adaptation of virtual computational environments in a multi-domain infrastructure
P Ruth, J Rhee, D Xu, R Kennell, S Goasguen
2006 IEEE International Conference on Autonomic Computing, 5-14, 2006
2612006
High Accuracy Attack Provenance via Binary-based Execution Partition.
KH Lee, X Zhang, D Xu
NDSS 16, 2013
2552013
Protracer: Towards practical provenance tracing by alternating between logging and tainting
S Ma, X Zhang, D Xu
23rd Annual Network And Distributed System Security Symposium (NDSS 2016), 2016
2532016
Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis
JY Chen, G Pandurangan, D Xu
IEEE Transactions on Parallel and Distributed Systems 17 (9), 987-1000, 2006
2492006
GnuStream: a P2P media streaming system prototype
X Jiang, Y Dong, D Xu, B Bhargava
2003 International Conference on Multimedia and Expo. ICME'03. Proceedings …, 2003
2442003
QoS-aware middleware for ubiquitous and heterogeneous environments
K Nahrstedt, D Xu, D Wichadakul, B Li
IEEE Communications magazine 39 (11), 140-148, 2001
2412001
Dksm: Subverting virtual machine introspection for fun and profit
S Bahram, X Jiang, Z Wang, M Grace, J Li, D Srinivasan, J Rhee, D Xu
2010 29th IEEE symposium on reliable distributed systems, 82-91, 2010
2362010
Collapsar: A VM-Based Architecture for Network Attack Detention Center.
X Jiang, D Xu
USENIX Security Symposium, 15-28, 2004
2232004
Detecting attacks against robotic vehicles: A control invariant approach
H Choi, WC Lee, Y Aafer, F Fei, Z Tu, X Zhang, D Xu, X Deng
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2172018
Retrowrite: Statically instrumenting cots binaries for fuzzing and sanitization
S Dinesh, N Burow, D Xu, M Payer
2020 IEEE Symposium on Security and Privacy (SP), 1497-1511, 2020
1992020
Hercule: Attack story reconstruction via community discovery on correlated log graph
K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang, L Si, X Zhang, ...
Proceedings of the 32Nd Annual Conference on Computer Security Applications …, 2016
1982016
Loggc: garbage collecting audit log
KH Lee, X Zhang, D Xu
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1932013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20