Folgen
Kevin Borders
Kevin Borders
Bestätigte E-Mail-Adresse bei umich.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Method, system and computer program product for detecting at least one of security threats and undesirable computer files
KR Borders
US Patent 9,055,093, 2015
5242015
Web tap: detecting covert web traffic
K Borders, A Prakash
Proceedings of the 11th ACM conference on Computer and communications …, 2004
2182004
Social networks and context-aware spam
G Brown, T Howe, M Ihbe, A Prakash, K Borders
Proceedings of the 2008 ACM conference on Computer supported cooperative …, 2008
1822008
Siren: Catching evasive malware
K Borders, X Zhao, A Prakash
2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-85, 2006
1122006
Quantifying information leaks in outbound web traffic
K Borders, A Prakash
2009 30th IEEE Symposium on Security and Privacy, 129-140, 2009
1102009
Method, system and computer program product for detecting security threats in a computer network
KR Borders
US Patent 8,079,080, 2011
822011
Protecting Confidential Data on Personal Computers with Storage Capsules.
K Borders, E Vander Weele, B Lau, A Prakash
USENIX Security Symposium, 367-382, 2009
822009
Towards protecting sensitive files in a compromised system
X Zhao, K Borders, A Prakash
Third IEEE International Security in Storage Workshop (SISW'05), 8 pp.-28, 2005
762005
Chimera: A Declarative Language for Streaming Network Traffic Analysis.
K Borders, J Springer, M Burnside
USENIX Security Symposium 10 (2362793.2362812), 2012
732012
CPOL: High-performance policy evaluation
K Borders, X Zhao, A Prakash
Proceedings of the 12th ACM conference on Computer and communications …, 2005
652005
Analyzing websites for user-visible security design flaws
L Falk, A Prakash, K Borders
Proceedings of the 4th Symposium on Usable Privacy and Security, 117-126, 2008
552008
Method, system and computer program product for comparing or measuring information content in at least one data stream
KR Borders
US Patent 8,515,918, 2013
332013
Spector: Automatically analyzing shell code
K Borders, A Prakash, M Zielinski
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
282007
Securing Network Input via a Trusted Input Proxy.
K Borders, A Prakash
HotSec, 2007
282007
Svgrid: a secure virtual environment for untrusted grid applications
X Zhao, K Borders, A Prakash
Proceedings of the 3rd international workshop on Middleware for grid …, 2005
272005
Virtual machine security systems
X Zhao, K Borders, A Prakash
Advances in Computer Science and Engineering 1, 339-365, 2009
252009
OpenFire: Using deception to reduce network attacks
K Borders, L Falk, A Prakash
2007 Third International Conference on Security and Privacy in …, 2007
232007
Method, system and computer program product for creating collages that visually resemble a particular shape or group of shapes
KR Borders, JM Golden
US Patent 9,275,479, 2016
172016
Securing sensitive content in a view-only file system
K Borders, X Zhao, A Prakash
Proceedings of the ACM workshop on digital rights management, 27-36, 2006
162006
malnets: large‐scale malicious networks via compromised wireless access points
P Traynor, K Butler, W Enck, P McDaniel, K Borders
Security and Communication Networks 3 (2‐3), 102-113, 2010
152010
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20