Method, system and computer program product for detecting at least one of security threats and undesirable computer files KR Borders US Patent 9,055,093, 2015 | 524 | 2015 |
Web tap: detecting covert web traffic K Borders, A Prakash Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 218 | 2004 |
Social networks and context-aware spam G Brown, T Howe, M Ihbe, A Prakash, K Borders Proceedings of the 2008 ACM conference on Computer supported cooperative …, 2008 | 182 | 2008 |
Siren: Catching evasive malware K Borders, X Zhao, A Prakash 2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-85, 2006 | 112 | 2006 |
Quantifying information leaks in outbound web traffic K Borders, A Prakash 2009 30th IEEE Symposium on Security and Privacy, 129-140, 2009 | 110 | 2009 |
Method, system and computer program product for detecting security threats in a computer network KR Borders US Patent 8,079,080, 2011 | 82 | 2011 |
Protecting Confidential Data on Personal Computers with Storage Capsules. K Borders, E Vander Weele, B Lau, A Prakash USENIX Security Symposium, 367-382, 2009 | 82 | 2009 |
Towards protecting sensitive files in a compromised system X Zhao, K Borders, A Prakash Third IEEE International Security in Storage Workshop (SISW'05), 8 pp.-28, 2005 | 76 | 2005 |
Chimera: A Declarative Language for Streaming Network Traffic Analysis. K Borders, J Springer, M Burnside USENIX Security Symposium 10 (2362793.2362812), 2012 | 73 | 2012 |
CPOL: High-performance policy evaluation K Borders, X Zhao, A Prakash Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 65 | 2005 |
Analyzing websites for user-visible security design flaws L Falk, A Prakash, K Borders Proceedings of the 4th Symposium on Usable Privacy and Security, 117-126, 2008 | 55 | 2008 |
Method, system and computer program product for comparing or measuring information content in at least one data stream KR Borders US Patent 8,515,918, 2013 | 33 | 2013 |
Spector: Automatically analyzing shell code K Borders, A Prakash, M Zielinski Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007 | 28 | 2007 |
Securing Network Input via a Trusted Input Proxy. K Borders, A Prakash HotSec, 2007 | 28 | 2007 |
Svgrid: a secure virtual environment for untrusted grid applications X Zhao, K Borders, A Prakash Proceedings of the 3rd international workshop on Middleware for grid …, 2005 | 27 | 2005 |
Virtual machine security systems X Zhao, K Borders, A Prakash Advances in Computer Science and Engineering 1, 339-365, 2009 | 25 | 2009 |
OpenFire: Using deception to reduce network attacks K Borders, L Falk, A Prakash 2007 Third International Conference on Security and Privacy in …, 2007 | 23 | 2007 |
Method, system and computer program product for creating collages that visually resemble a particular shape or group of shapes KR Borders, JM Golden US Patent 9,275,479, 2016 | 17 | 2016 |
Securing sensitive content in a view-only file system K Borders, X Zhao, A Prakash Proceedings of the ACM workshop on digital rights management, 27-36, 2006 | 16 | 2006 |
malnets: large‐scale malicious networks via compromised wireless access points P Traynor, K Butler, W Enck, P McDaniel, K Borders Security and Communication Networks 3 (2‐3), 102-113, 2010 | 15 | 2010 |