Kevin W. Hamlen
Kevin W. Hamlen
Eugene McDermott Professor of Computer Science, The University of Texas at Dallas
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα - Αρχική σελίδα
Παρατίθεται από
Παρατίθεται από
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Security issues for cloud computing
K Hamlen, M Kantarcioglu, L Khan, B Thuraisingham
International Journal of Information Security and Privacy (IJISP) 4 (2), 36-48, 2010
Computability classes for enforcement mechanisms
KW Hamlen, G Morrisett, FB Schneider
ACM Transactions on Programming Languages and Systems (TOPLAS) 28 (1), 175-205, 2006
Opaque Control-Flow Integrity.
V Mohan, P Larsen, S Brunthaler, KW Hamlen, M Franz
NDSS 26, 27-30, 2015
Flow-based identification of botnet traffic by mining multiple log files
MM Masud, T Al-Khateeb, L Khan, B Thuraisingham, KW Hamlen
2008 first international conference on distributed framework and …, 2008
Facing the reality of data stream classification: coping with scarcity of labeled data
MM Masud, C Woolam, J Gao, L Khan, J Han, KW Hamlen, NC Oza
Knowledge and information systems 33 (1), 213-244, 2012
Certified in-lined reference monitoring on. net
KW Hamlen, G Morrisett, FB Schneider
Proceedings of the 2006 workshop on Programming languages and analysis for …, 2006
Hatman: Intra-cloud trust management for Hadoop
SM Khan, KW Hamlen
2012 IEEE Fifth International Conference on Cloud Computing, 494-501, 2012
From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation
F Araujo, KW Hamlen, S Biedermann, S Katzenbeisser
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
Aspect-oriented in-lined reference monitors
KW Hamlen, M Jones
Proceedings of the third ACM SIGPLAN workshop on Programming languages and …, 2008
Differentiating code from data in x86 binaries
R Wartell, Y Zhou, KW Hamlen, M Kantarcioglu, B Thuraisingham
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2011
Securing untrusted code via compiler-agnostic binary rewriting
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
On the Trusted Use of Large-Scale Personal Data.
YA de Montjoye, SS Wang, A Pentland, DTT Anh, A Datta
IEEE Data Eng. Bull. 35 (4), 5-8, 2012
Cloud-based malware detection for evolving data streams
MM Masud, TM Al-Khateeb, KW Hamlen, J Gao, L Khan, J Han, ...
ACM transactions on management information systems (TMIS) 2 (3), 1-27, 2011
Insider threat detection using stream mining and graph mining
P Parveen, J Evans, B Thuraisingham, KW Hamlen, L Khan
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
AnonymousCloud: A data ownership privacy provider framework in cloud computing
SM Khan, KW Hamlen
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
Decentralized IoT data management using blockchain and trusted execution environment
G Ayoade, V Karande, L Khan, K Hamlen
2018 IEEE International Conference on Information Reuse and Integration (IRI …, 2018
Data mining for security applications
B Thuraisingham, L Khan, MM Masud, KW Hamlen
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2008
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.
E Bauman, Z Lin, KW Hamlen
NDSS, 2018
Vigiles: Fine-grained access control for mapreduce systems
H Ulusoy, M Kantarcioglu, E Pattuk, K Hamlen
2014 IEEE International Congress on Big Data, 40-47, 2014
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20