×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [wenke lee]
CERCS - Creating System Solutions for Future Technologies
636 views
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks
223 views
2008-7-31 Guofei Gu BotMiner BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Guofei Gu 1,2,
214 views
Secure In-VM Monitoring Using Hardware Virtualization Monirul Sharif, Wenke Lee, Weidong Cui, and Andrea Lanzi Presented by Tyler Bletsch
216 views
Mimesis Aegis: A Mimicry Privacy Shield A System's Approach to Data Privacy on Public Cloud Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke
215 views
Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee and Guofei Jiang CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerability
219 views
1 Polymorphic Blending Attacks By Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg Kolesnikov and Wenke Lee Presented by Jelena Mirkovic Topic 1
226 views
Intrusion Detection Techniques for Mobile Wireless Networks Authors: Yongguang Zhang, HRL Laboratories LLC, Malibu, California. Wenke Lee, College of Computing,
215 views
Building a Scalable System for StealthyP2P-Botnet Detection
37 views
Mobile Device Security Challenges Mustaque Ahamad, Director, Georgia Tech Information Security Center Patricia Titus, VP and Global Chief Information
223 views
Botnet and Spam Detection in High-Speed Networks
97 views
Mimesis Aegis: A Mimicry Privacy Shield A System's Approach to Data Privacy on Public Cloud
69 views
Next >