Evan Downing
Citata da
Citata da
Rain: Refinable attack investigation with on-demand inter-process information flow tracking
Y Ji, S Lee, E Downing, W Wang, M Fazzini, T Kim, A Orso, W Lee
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Nv: Nessus vulnerability visualization for the web
L Harrison, R Spahn, M Iannacone, E Downing, JR Goodall
Proceedings of the ninth international symposium on visualization for cyber …, 2012
Enabling refinable cross-host attack investigation with efficient data flow tagging and tracking
Y Ji, S Lee, M Fazzini, J Allen, E Downing, T Kim, A Orso, W Lee
27th {USENIX} Security Symposium ({USENIX} Security 18), 1705-1722, 2018
situ: Situational understanding and discovery for cyber attacks
L Harrison, J Laska, R Spahn, M Iannacone, E Downing, EM Ferragut, ...
2012 IEEE Conference on Visual Analytics Science and Technology (VAST), 307-308, 2012
Beholder: Phase-Space Detection of Cyber Events
JMH Jiménez, L Hively, E Downing, A Ferber, S Prowell, R Wagner
Oak Ridge National Laboratory, Oak Ridge, TN, ORNL/TM-2013/294, 2013
To believe or not to believe: Validating explanation fidelity for dynamic malware analysis.
L Chen, C Yagemann, E Downing
CVPR Workshops, 48-52, 2019
MLsploit [Judges Remarks]
E Downing
Georgia Institute of Technology, 2019
MLsploit: A Framework for Interactive Experimentation with Adversarial Machine Learning Research
N Das, S Li, C Jeon, J Jung, ST Chen, C Yagemann, E Downing, H Park, ...
Il sistema al momento non puň eseguire l'operazione. Riprova piů tardi.
Articoli 1–8