Follow
Phuong Cao
Title
Cited by
Cited by
Year
Reliability and security monitoring of virtual machines using hardware architectural invariants
C Pham, ZJ Estrada, P Cao, Z Kalbarczyk, RK Iyer
44th IEEE International Conference on Dependable Systems and Networks (DSN), 2014
592014
Preemptive intrusion detection: Theoretical framework and real-world measurements
P Cao, E Badger, Z Kalbarczyk, R Iyer, A Slagell
ACM Symposium and Bootcamp on the Science of Security (HotSoS), 2015
49*2015
Toward a high availability cloud: Techniques and challenges
C Pham, P Cao, Z Kalbarczyk, RK Iyer
42nd IEEE International Conference on Dependable Systems and Networks (DSN), 2012
322012
CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks
PM Cao, Y Wu, SS Banerjee, J Azoff, A Withers, ZT Kalbarczyk, RK Iyer
16th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2019
292019
Towards an unified security testbed and security analytics framework
P Cao, EC Badger, ZT Kalbarczyk, RK Iyer, A Withers, AJ Slagell
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 24, 2015
16*2015
On preempting advanced persistent threats using probabilistic graphical models
P Cao
arXiv preprint arXiv:1903.08826, 2019
9*2019
Personalized password guessing: a new security threat
P Cao, H Li, K Nahrstedt, Z Kalbarczyk, R Iyer, AJ Slagell
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 22, 2014
82014
Investigating root causes of authentication failures using a SAML and OIDC observatory
J Basney, P Cao, T Fleury
2020 IEEE 6th International Conference on Dependability in Sensor, Cloud and …, 2020
62020
Mining threat intelligence from billion-scale SSH brute-force attacks
Y Wu
University of Illinois at Urbana-Champaign, 2020
62020
Predicting ICU admissions for hospitalized COVID-19 patients with a factor graph-based model
Y Cao, P Cao, H Chen, KM Kochendorfer, AB Trotter, WL Galanter, ...
Multimodal AI in healthcare: A paradigm shift in health intelligence, 245-256, 2022
32022
Taxonomy of Fingerprinting Techniques for Evaluation of Smart Grid Honeypot Realism
V Tay, X Li, D Mashima, B Ng, P Cao, Z Kalbarczyk, RK Iyer
2023 IEEE International Conference on Communications, Control, and Computing …, 2023
12023
Poster: Mining threat intelligence from billion-scale SSH brute-force attacks
Y Wu, P Cao, A Withers, ZT Kalbarczyk, RK Iyer
Proc. Netw. Distrib. Syst. Security, 1-3, 2020
12020
SVAuth–A Single-Sign-On Integration Solution with Runtime Verification
S Chen, M McCutchen, P Cao, S Qadeer, RK Iyer
International Conference on Runtime Verification (RV), 349-358, 2017
12017
stealthML: Data-driven Malware for Stealthy Data Exfiltration
K Chung, P Cao, ZT Kalbarczyk, RK Iyer
2023 IEEE International Conference on Cyber Security and Resilience (CSR), 16-21, 2023
2023
Basic Research Needs in Quantum Computing and Networking
P Lougovski, O Parekh, J Broz, M Byrd, Y Chembo, WA de Jong, ...
https://www.osti.gov/biblio/2001045, 56-57, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–15