|
Search the dblp DataBase
Weidong Cui:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Weidong Cui, Randy H. Katz, Wai-tian Tan
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:361-370 [Conf]
- Weidong Cui, Ion Stoica, Randy H. Katz
Backup Path Allocation Based on a Correlated Link Failure Probability Model in Overlay Networks. [Citation Graph (0, 0)][DBLP] ICNP, 2002, pp:236- [Conf]
- Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H. Katz
Protocol-Independent Adaptive Replay of Application Dialog. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Bhaskaran Raman, Sharad Agarwal, Yan Chen, Matthew Caesar, Weidong Cui, Per Johansson, Kevin Lai, Tal Lavian, Sridhar Machiraju, Zhuoqing Morley Mao, George Porter, Timothy Roscoe, Mukund Seshadri, Jimmy S. Shih, Keith Sklower, Lakshminarayanan Subramanian, Takashi Suzuki, Shelley Zhuang, Anthony D. Joseph, Randy H. Katz, Ion Stoica
The SAHARA Model for Service Composition across Multiple Providers. [Citation Graph (0, 0)][DBLP] Pervasive, 2002, pp:1-14 [Conf]
- Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2007, pp:252-266 [Conf]
- Weidong Cui, Randy H. Katz, Wai-tian Tan
BINDER: An Extrusion-Based Break-In Detector for Personal Computers. [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, General Track, 2005, pp:363-366 [Conf]
Tupni: automatic reverse engineering of input formats. [Citation Graph (, )][DBLP]
Countering kernel rootkits with lightweight hook protection. [Citation Graph (, )][DBLP]
Secure in-VM monitoring using hardware virtualization. [Citation Graph (, )][DBLP]
Mapping kernel objects to enable systematic integrity checking. [Citation Graph (, )][DBLP]
ReFormat: Automatic Reverse Engineering of Encrypted Messages. [Citation Graph (, )][DBLP]
Countering Persistent Kernel Rootkits through Systematic Hook Discovery. [Citation Graph (, )][DBLP]
Spectator: Detection and Containment of JavaScript Worms. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|