A hierarchical CPU scheduler for multimedia operating systems P Goyal, X Guo, HM Vin OSDI 96 (22), 107-121, 1996 | 1135* | 1996 |
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code R Wartell, V Mohan, KW Hamlen, Z Lin Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 503 | 2012 |
Security issues for cloud computing K Hamlen, M Kantarcioglu, L Khan, B Thuraisingham International Journal of Information Security and Privacy (IJISP) 4 (2), 36-48, 2010 | 362 | 2010 |
Computability classes for enforcement mechanisms KW Hamlen, G Morrisett, FB Schneider ACM Transactions on Programming Languages and Systems (TOPLAS) 28 (1), 175-205, 2006 | 317 | 2006 |
Opaque Control-Flow Integrity. V Mohan, P Larsen, S Brunthaler, KW Hamlen, M Franz NDSS 26, 27-30, 2015 | 251 | 2015 |
Decentralized IoT data management using blockchain and trusted execution environment G Ayoade, V Karande, L Khan, K Hamlen 2018 IEEE international conference on information reuse and integration (IRI …, 2018 | 205 | 2018 |
Facing the reality of data stream classification: coping with scarcity of labeled data MM Masud, C Woolam, J Gao, L Khan, J Han, KW Hamlen, NC Oza Knowledge and information systems 33, 213-244, 2012 | 175 | 2012 |
Flow-based identification of botnet traffic by mining multiple log files MM Masud, T Al-Khateeb, L Khan, B Thuraisingham, KW Hamlen 2008 first international conference on distributed framework and …, 2008 | 157 | 2008 |
From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation F Araujo, KW Hamlen, S Biedermann, S Katzenbeisser Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 154 | 2014 |
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics. E Bauman, Z Lin, KW Hamlen NDSS, 2018 | 149 | 2018 |
Differentiating code from data in x86 binaries R Wartell, Y Zhou, KW Hamlen, M Kantarcioglu, B Thuraisingham Joint European Conference on Machine Learning and Knowledge Discovery in …, 2011 | 137 | 2011 |
Adaptive encrypted traffic fingerprinting with bi-directional dependence K Al-Naami, S Chandra, A Mustafa, L Khan, Z Lin, K Hamlen, ... Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 118 | 2016 |
Certified in-lined reference monitoring on. net KW Hamlen, G Morrisett, FB Schneider Proceedings of the 2006 workshop on Programming languages and analysis for …, 2006 | 117 | 2006 |
Securing untrusted code via compiler-agnostic binary rewriting R Wartell, V Mohan, KW Hamlen, Z Lin Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 114 | 2012 |
Seismic: Secure in-lined script monitors for interrupting cryptojacks W Wang, B Ferrell, X Xu, KW Hamlen, S Hao Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 96 | 2018 |
Aspect-oriented in-lined reference monitors KW Hamlen, M Jones Proceedings of the third ACM SIGPLAN workshop on Programming languages and …, 2008 | 96 | 2008 |
Insider threat detection using stream mining and graph mining P Parveen, J Evans, B Thuraisingham, KW Hamlen, L Khan 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 92 | 2011 |
Hatman: Intra-cloud trust management for Hadoop SM Khan, KW Hamlen 2012 IEEE Fifth International Conference on Cloud Computing, 494-501, 2012 | 90 | 2012 |
On the Trusted Use of Large-Scale Personal Data. YA de Montjoye, SS Wang, A Pentland, DTT Anh, A Datta IEEE Data Eng. Bull. 35 (4), 5-8, 2012 | 89 | 2012 |
AnonymousCloud: A data ownership privacy provider framework in cloud computing SM Khan, KW Hamlen 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 83 | 2012 |