Citation Impact
Citing Papers
AdJail: practical enforcement of confidentiality and integrity policies on web advertisements
2010
CloudAV: N-version antivirus in the network cloud
2008
OFRewind: enabling record and replay troubleshooting for networks
2011
A Crawler-based Study of Spyware on the Web
2005
Resilient distributed datasets: a fault-tolerant abstraction for in-memory cluster computing
2012 Standout
SpyProxy: execution-based detection of malicious web content
2007
BrowserShield: vulnerability-driven filtering of dynamic HTML
2006
EXPLODE: a lightweight, general system for finding serious storage system errors
2006
R2: an application-level kernel for record and replay
2008
A study of android application security
2011 Standout
NetCheck: network diagnoses from blackbox traces
2014
NOZZLE: a defense against heap-spraying code injection attacks
2009
Understanding data lifetime via whole system simulation
2004
A Quantitative Study of Forum Spamming Using Context-based Analysis.
2007
A Virtual Machine Introspection Based Architecture for Intrusion Detection.
2003
KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs
2008 Standout
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
2010 Standout
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
2012
MulVAL: a logic-based network security analyzer
2005 Standout
Forensic triage for mobile phones with DEC0DE
2011
Permission re-delegation: attacks and defenses
2011 Standout
Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients
2008
Software-Defined Networking: A Comprehensive Survey
2014 Standout
A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges
2017 Standout
Dynamic Spyware Analysis
2007
A survey of security issues in hardware virtualization
2013
Survey of Important Issues in UAV Communication Networks
2015 Standout
Vigilante
2005
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
2005 Standout
Nonorthogonal Multiple Access for 5G and Beyond
2017 Standout
Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges
2019 Standout
A network worm vaccine architecture
2004
Cyber–Physical System Security for the Electric Power Grid
2011 Standout
Paranoid Android
2010
A Survey on Software-Defined Networking
2014 Standout
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
2016 Standout
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
2010 Standout
Cyber–Physical Security of a Smart Grid Infrastructure
2011 Standout
AdSentry
2011
Survey of intrusion detection systems: techniques, datasets and challenges
2019 Standout
Veriflow
2012
A survey of mobile cloud computing: architecture, applications, and approaches
2011 Standout
Internet of Things (IoT) for Next-Generation Smart Systems: A Review of Current Challenges, Future Trends and Prospects for Emerging 5G-IoT Scenarios
2020 Standout
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software
2006
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
2008 Standout
Labels and event processes in the Asbestos operating system
2007
A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks
2014 Standout
Energy-Optimal Mobile Cloud Computing under Stochastic Wireless Channel
2013 Standout
Countering code-injection attacks with instruction-set randomization
2003 Standout
seL4
2009 Standout
Predicting students' final performance from participation in on-line discussion forums
2013 Standout
Android Security: A Survey of Issues, Malware Penetration, and Defenses
2014 Standout
Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing
2011 Standout
Terra
2003
Labels and event processes in the asbestos operating system
2005
Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions
2011 Standout
A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus
2018 Standout
Task Offloading for Mobile Edge Computing in Software Defined Ultra-Dense Network
2018 Standout
Network Function Virtualization: State-of-the-Art and Research Challenges
2015 Standout
You are what you include
2012 Standout
Xen and the art of virtualization
2003 Standout
TaintDroid
2014 Standout
On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration
2017 Standout
Mobile Edge Computing: A Survey
2017 Standout
Detection and analysis of drive-by-download attacks and malicious JavaScript code
2010 Standout
Intrusion detection system: A comprehensive review
2012 Standout
Internet of Things in the 5G Era: Enablers, Architecture, and Business Models
2016 Standout
Quire: Lightweight Provenance for Smart Phone Operating Systems
2011
Cumulative Attestation Kernels for Embedded Systems
2012
A Survey on Mobile Edge Computing: The Communication Perspective
2017 Standout
Works of Samuel T. King being referenced
Debugging operating systems with time-traveling virtual machines
2005
The multi-principal OS construction of the gazelle web browser
2009
Enriching Intrusion Alerts Through Multi-Host Causality.
2005
Trust and protection in the Illinois browser operating system
2010
Operating system support for virtual machines
2003
Using replicated execution for a more secure and reliable web browser.
2012
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities.
2006
Digging for data structures
2008
Backtracking intrusions
2005
Debugging the data plane with anteater
2011
Detecting past and present intrusions through vulnerability-specific predicates
2005
ReVirt
2002