The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Weidong Cui: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Weidong Cui, Randy H. Katz, Wai-tian Tan
    Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:361-370 [Conf]
  2. Weidong Cui, Ion Stoica, Randy H. Katz
    Backup Path Allocation Based on a Correlated Link Failure Probability Model in Overlay Networks. [Citation Graph (0, 0)][DBLP]
    ICNP, 2002, pp:236- [Conf]
  3. Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H. Katz
    Protocol-Independent Adaptive Replay of Application Dialog. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  4. Bhaskaran Raman, Sharad Agarwal, Yan Chen, Matthew Caesar, Weidong Cui, Per Johansson, Kevin Lai, Tal Lavian, Sridhar Machiraju, Zhuoqing Morley Mao, George Porter, Timothy Roscoe, Mukund Seshadri, Jimmy S. Shih, Keith Sklower, Lakshminarayanan Subramanian, Takashi Suzuki, Shelley Zhuang, Anthony D. Joseph, Randy H. Katz, Ion Stoica
    The SAHARA Model for Service Composition across Multiple Providers. [Citation Graph (0, 0)][DBLP]
    Pervasive, 2002, pp:1-14 [Conf]
  5. Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto
    ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:252-266 [Conf]
  6. Weidong Cui, Randy H. Katz, Wai-tian Tan
    BINDER: An Extrusion-Based Break-In Detector for Personal Computers. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2005, pp:363-366 [Conf]

  7. Tupni: automatic reverse engineering of input formats. [Citation Graph (, )][DBLP]


  8. Countering kernel rootkits with lightweight hook protection. [Citation Graph (, )][DBLP]


  9. Secure in-VM monitoring using hardware virtualization. [Citation Graph (, )][DBLP]


  10. Mapping kernel objects to enable systematic integrity checking. [Citation Graph (, )][DBLP]


  11. ReFormat: Automatic Reverse Engineering of Encrypted Messages. [Citation Graph (, )][DBLP]


  12. Countering Persistent Kernel Rootkits through Systematic Hook Discovery. [Citation Graph (, )][DBLP]


  13. Spectator: Detection and Containment of JavaScript Worms. [Citation Graph (, )][DBLP]


Search in 0.018secs, Finished in 0.019secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002