Ikuti
Stefan Savage
Stefan Savage
Professor of Computer Science and Engineering, UC San Diego
Email yang diverifikasi di cs.ucsd.edu - Beranda
Judul
Dikutip oleh
Dikutip oleh
Tahun
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
T Ristenpart, E Tromer, H Shacham, S Savage
Proceedings of the 16th ACM conference on Computer and communications …, 2009
30362009
Experimental security analysis of a modern automobile
K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ...
2010 IEEE symposium on security and privacy, 447-462, 2010
25732010
Comprehensive experimental analyses of automotive attack surfaces
S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ...
20th USENIX security symposium (USENIX Security 11), 2011
23002011
Inferring internet denial-of-service activity
D Moore, C Shannon, DJ Brown, GM Voelker, S Savage
ACM Transactions on Computer Systems (TOCS) 24 (2), 115-139, 2006
22302006
Eraser: A dynamic data race detector for multithreaded programs
S Savage, M Burrows, G Nelson, P Sobalvarro, T Anderson
ACM Transactions on Computer Systems (TOCS) 15 (4), 391-411, 1997
21111997
Practical network support for IP traceback
S Savage, D Wetherall, A Karlin, T Anderson
Proceedings of the conference on Applications, Technologies, Architectures …, 2000
20392000
A fistful of bitcoins: characterizing payments among men with no names
S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ...
Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013
19172013
Inside the Slammer Worm
D Moore, V Paxson, S Savage, C Shannon, S Staniford
IEEE Magazine of Security and Privacy, 33-39, 2003
1780*2003
Extensibility safety and performance in the SPIN operating system
BN Bershad, S Savage, P Pardyak, EG Sirer, ME Fiuczynski, D Becker, ...
Proceedings of the fifteenth ACM symposium on Operating systems principles …, 1995
15921995
Beyond blacklists: learning to detect malicious web sites from suspicious URLs
J Ma, LK Saul, S Savage, GM Voelker
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
11752009
Automated Worm Fingerprinting.
S Singh, C Estan, G Varghese, S Savage
OSDI 4, 4-4, 2004
11462004
802.11 {Denial-of-Service} attacks: Real vulnerabilities and practical solutions
J Bellardo, S Savage
12th USENIX security symposium (USENIX Security 03), 2003
10962003
Internet quarantine: Requirements for containing self-propagating code
D Moore, C Shannon, GM Voelker, S Savage
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
10902003
Network support for IP traceback
S Savage, D Wetherall, A Karlin, T Anderson
IEEE/ACM transactions on networking 9 (3), 226-237, 2001
9112001
Measuring the cost of cybercrime
R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ...
The economics of information security and privacy, 265-300, 2013
8422013
Understanding availability
R Bhagwan, S Savage, GM Voelker
Peer-to-Peer Systems II: Second International Workshop, IPTPS 2003, Berkeley …, 2003
8002003
Identifying suspicious URLs: an application of large-scale online learning
J Ma, LK Saul, S Savage, GM Voelker
Proceedings of the 26th annual international conference on machine learning …, 2009
7992009
Return-oriented programming: Systems, languages, and applications
R Roemer, E Buchanan, H Shacham, S Savage
ACM Transactions on Information and System Security (TISSEC) 15 (1), 1-34, 2012
7982012
Modeling TCP latency
N Cardwell, S Savage, T Anderson
Proceedings IEEE INFOCOM 2000. Conference on Computer Communications …, 2000
7712000
SyncScan: practical fast handoff for 802.11 infrastructure networks
I Ramani, S Savage
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005
7652005
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20