Æȷοì
Kevin Borders
Kevin Borders
umich.eduÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Method, system and computer program product for detecting at least one of security threats and undesirable computer files
KR Borders
US Patent 9,055,093, 2015
5542015
Web tap: detecting covert web traffic
K Borders, A Prakash
Proceedings of the 11th ACM conference on Computer and communications ¡¦, 2004
2242004
Social networks and context-aware spam
G Brown, T Howe, M Ihbe, A Prakash, K Borders
Proceedings of the 2008 ACM conference on Computer supported cooperative ¡¦, 2008
1862008
Quantifying information leaks in outbound web traffic
K Borders, A Prakash
2009 30th IEEE Symposium on Security and Privacy, 129-140, 2009
1122009
Siren: Catching evasive malware
K Borders, X Zhao, A Prakash
2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-85, 2006
1122006
Method, system and computer program product for detecting security threats in a computer network
KR Borders
US Patent 8,079,080, 2011
872011
Chimera: A declarative language for streaming network traffic analysis
K Borders, J Springer, M Burnside
21st USENIX security symposium (USENIX Security 12), 365-379, 2012
842012
Protecting Confidential Data on Personal Computers with Storage Capsules.
K Borders, E Vander Weele, B Lau, A Prakash
USENIX Security Symposium, 367-382, 2009
842009
Towards protecting sensitive files in a compromised system
X Zhao, K Borders, A Prakash
Third IEEE International Security in Storage Workshop (SISW'05), 8 pp.-28, 2005
762005
CPOL: High-performance policy evaluation
K Borders, X Zhao, A Prakash
Proceedings of the 12th ACM conference on Computer and communications ¡¦, 2005
642005
Analyzing websites for user-visible security design flaws
L Falk, A Prakash, K Borders
Proceedings of the 4th Symposium on Usable Privacy and Security, 117-126, 2008
562008
Method, system and computer program product for comparing or measuring information content in at least one data stream
KR Borders
US Patent 8,515,918, 2013
332013
Spector: Automatically analyzing shell code
K Borders, A Prakash, M Zielinski
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 ¡¦, 2007
312007
Securing Network Input via a Trusted Input Proxy.
K Borders, A Prakash
HotSec, 2007
292007
Svgrid: a secure virtual environment for untrusted grid applications
X Zhao, K Borders, A Prakash
Proceedings of the 3rd international workshop on Middleware for grid ¡¦, 2005
292005
Virtual machine security systems
X Zhao, K Borders, A Prakash
Advances in Computer Science and Engineering 1, 339-365, 2009
272009
OpenFire: Using deception to reduce network attacks
K Borders, L Falk, A Prakash
2007 Third International Conference on Security and Privacy in ¡¦, 2007
262007
Method, system and computer program product for creating collages that visually resemble a particular shape or group of shapes
KR Borders, JM Golden
US Patent 9,275,479, 2016
212016
Securing sensitive content in a view-only file system
K Borders, X Zhao, A Prakash
Proceedings of the ACM workshop on digital rights management, 27-36, 2006
172006
malnets: large‐scale malicious networks via compromised wireless access points
P Traynor, K Butler, W Enck, P McDaniel, K Borders
Security and Communication Networks 3 (2‐3), 102-113, 2010
152010
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20