|
Search the dblp DataBase
Shai Rubin:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Shai Rubin, Somesh Jha, Barton P. Miller
Automatic Generation and Analysis of NIDS Attacks. [Citation Graph (0, 0)][DBLP] ACSAC, 2004, pp:28-38 [Conf]
- Shai Rubin, David Bernstein, Michael Rodeh
Virtual Cache Line: A New Technique to Improve Cache Exploitation for Recursive Data Structures. [Citation Graph (0, 0)][DBLP] CC, 1999, pp:259-273 [Conf]
- Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd
An auctioning reputation system based on anomaly. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:270-279 [Conf]
- Shai Rubin, Somesh Jha, Barton P. Miller
Protomatching network traffic for high throughputnetwork intrusion detection. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:47-58 [Conf]
- Shai Rubin, Somesh Jha, Barton P. Miller
On the Completeness of Attack Mutation Algorithms. [Citation Graph (0, 0)][DBLP] CSFW, 2006, pp:43-56 [Conf]
- Shai Rubin, Ian D. Alderman, David W. Parter, Mary K. Vernon
Foundations for Intrusion Prevention. [Citation Graph (0, 0)][DBLP] DIMVA, 2004, pp:143-160 [Conf]
- Brian A. Fields, Shai Rubin, Rastislav Bodík
Focusing processor policies via critical-path prediction. [Citation Graph (0, 0)][DBLP] ISCA, 2001, pp:74-85 [Conf]
- Shai Rubin, Rastislav Bodík, Trishul M. Chilimbi
An efficient profile-analysis framework for data-layout optimizations. [Citation Graph (0, 0)][DBLP] POPL, 2002, pp:140-153 [Conf]
- Shai Rubin, Somesh Jha, Barton P. Miller
Language-Based Generation and Evaluation of NIDS Signatures. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2005, pp:3-17 [Conf]
Search in 0.001secs, Finished in 0.002secs
|