팔로우
William Robertson
William Robertson
Associate Professor of Computer Science, Northeastern University
ccs.neu.edu의 이메일 확인됨 - 홈페이지
제목
인용
인용
연도
Static disassembly of obfuscated binaries
C Kruegel, W Robertson, F Valeur, G Vigna
USENIX security Symposium 13, 18-18, 2004
679*2004
Polymorphic worm detection using structural information of executables
C Kruegel, E Kirda, D Mutz, W Robertson, G Vigna
Recent Advances in Intrusion Detection: 8th International Symposium, RAID …, 2006
5772006
Bayesian event classification for intrusion detection
C Kruegel, D Mutz, W Robertson, F Valeur
19th Annual Computer Security Applications Conference, 2003. Proceedings., 14-23, 2003
5652003
Cutting the gordian knot: A look under the hood of ransomware attacks
A Kharraz, W Robertson, D Balzarotti, L Bilge, E Kirda
Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015
5592015
{UNVEIL}: A {Large-Scale}, automated approach to detecting ransomware
A Kharaz, S Arshad, C Mulliner, W Robertson, E Kirda
25th USENIX security symposium (USENIX Security 16), 757-772, 2016
4822016
Disclosure: detecting botnet command and control servers through large-scale netflow analysis
L Bilge, D Balzarotti, W Robertson, E Kirda, C Kruegel
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
3882012
A multi-model approach to the detection of web-based attacks
C Kruegel, G Vigna, W Robertson
Computer Networks 48 (5), 717-738, 2005
3842005
Lava: Large-scale automated vulnerability addition
B Dolan-Gavitt, P Hulin, E Kirda, T Leek, A Mambretti, W Robertson, ...
2016 IEEE symposium on security and privacy (SP), 110-121, 2016
3812016
Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks
TF Yen, A Oprea, K Onarlioglu, T Leetham, W Robertson, A Juels, E Kirda
Proceedings of the 29th annual computer security applications conference …, 2013
3702013
Detecting kernel-level rootkits through binary analysis
C Kruegel, W Robertson, G Vigna
20th Annual Computer Security Applications Conference, 91-100, 2004
3422004
Testing network-based intrusion detection signatures using mutant exploits
G Vigna, W Robertson, D Balzarotti
Proceedings of the 11th ACM conference on Computer and communications …, 2004
2782004
Automating mimicry attacks using static binary analysis
C Kruegel, E Kirda, D Mutz, W Robertson, G Vigna
USENIX Security Symposium 14, 11-11, 2005
2722005
Using generalization and characterization techniques in the anomaly-based detection of web attacks
W Robertson, G Vigna, C Kruegel, RA Kemmerer
NDSS, 2006
2312006
A stateful intrusion detection system for world-wide web servers
G Vigna, W Robertson, V Kher, RA Kemmerer
19th Annual Computer Security Applications Conference, 2003. Proceedings., 34-43, 2003
2062003
Triggerscope: Towards detecting logic bombs in android applications
Y Fratantonio, A Bianchi, W Robertson, E Kirda, C Kruegel, G Vigna
2016 IEEE symposium on security and privacy (SP), 377-396, 2016
2042016
Thou shalt not depend on me: Analysing the use of outdated javascript libraries on the web
T Lauinger, A Chaabane, S Arshad, W Robertson, C Wilson, E Kirda
arXiv preprint arXiv:1811.00918, 2018
1842018
Alert verification determining the success of intrusion attempts
C Kruegel, W Robertson
DIMVA 2004, July 6-7, Dortmund, Germany, 2004
1452004
Tracing information flows between ad exchanges using retargeted ads
MA Bashir, S Arshad, W Robertson, C Wilson
25th USENIX Security Symposium (USENIX Security 16), 481-496, 2016
1442016
Run-time Detection of Heap-based Overflows.
WK Robertson, C Kruegel, D Mutz, F Valeur
LISA 3, 51-60, 2003
1302003
Topology-based detection of anomalous BGP messages
C Kruegel, D Mutz, W Robertson, F Valeur
Recent Advances in Intrusion Detection: 6th International Symposium, RAID …, 2003
1282003
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20