William Robertson
William Robertson
Assistant Professor of Computer Science, Northeastern University
Email verificata su ccs.neu.edu
TitoloCitata daAnno
Polymorphic worm detection using structural information of executables
C Kruegel, E Kirda, D Mutz, W Robertson, G Vigna
International Workshop on Recent Advances in Intrusion Detection, 207-226, 2005
4842005
Bayesian event classification for intrusion detection
C Kruegel, D Mutz, W Robertson, F Valeur
19th Annual Computer Security Applications Conference, 2003. Proceedings., 14-23, 2003
4072003
Static disassembly of obfuscated binaries
C Kruegel, W Robertson, F Valeur, G Vigna
USENIX security Symposium 13, 18-18, 2004
3702004
A multi-model approach to the detection of web-based attacks
C Kruegel, G Vigna, W Robertson
Computer Networks 48 (5), 717-738, 2005
3052005
Detecting kernel-level rootkits through binary analysis
C Kruegel, W Robertson, G Vigna
20th Annual Computer Security Applications Conference, 91-100, 2004
2842004
Cutting the gordian knot: A look under the hood of ransomware attacks
A Kharraz, W Robertson, D Balzarotti, L Bilge, E Kirda
International Conference on Detection of Intrusions and Malware, and …, 2015
2262015
Testing network-based intrusion detection signatures using mutant exploits
G Vigna, W Robertson, D Balzarotti
Proceedings of the 11th ACM conference on Computer and communications …, 2004
2262004
Automating mimicry attacks using static binary analysis
C Kruegel, E Kirda, D Mutz, W Robertson, G Vigna
USENIX Security Symposium 14, 11-11, 2005
2162005
Disclosure: detecting botnet command and control servers through large-scale netflow analysis
L Bilge, D Balzarotti, W Robertson, E Kirda, C Kruegel
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
2092012
Using generalization and characterization techniques in the anomaly-based detection of web attacks
W Robertson, G Vigna, C Kruegel, RA Kemmerer
NDSS, 2006
1882006
Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks
TF Yen, A Oprea, K Onarlioglu, T Leetham, W Robertson, A Juels, E Kirda
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
1712013
A stateful intrusion detection system for world-wide web servers
G Vigna, W Robertson, V Kher, RA Kemmerer
19th Annual Computer Security Applications Conference, 2003. Proceedings., 34-43, 2003
1702003
{UNVEIL}: A Large-Scale, Automated Approach to Detecting Ransomware
A Kharaz, S Arshad, C Mulliner, W Robertson, E Kirda
25th {USENIX} Security Symposium ({USENIX} Security 16), 757-772, 2016
1462016
Topology-based detection of anomalous BGP messages
C Kruegel, D Mutz, W Robertson, F Valeur
International Workshop on Recent Advances in Intrusion Detection, 17-35, 2003
1172003
Hulk: Eliciting malicious behavior in browser extensions
A Kapravelos, C Grier, N Chachra, C Kruegel, G Vigna, V Paxson
23rd {USENIX} Security Symposium ({USENIX} Security 14), 641-654, 2014
1152014
Alert Verification Determining the Success of Intrusion Attempts.
C Kruegel, WK Robertson
DIMVA 4, 1-14, 2004
1152004
Run-time Detection of Heap-based Overflows.
WK Robertson, C Kruegel, D Mutz, F Valeur
LISA 3, 51-60, 2003
1012003
Lava: Large-scale automated vulnerability addition
B Dolan-Gavitt, P Hulin, E Kirda, T Leek, A Mambretti, W Robertson, ...
2016 IEEE Symposium on Security and Privacy (SP), 110-121, 2016
902016
Static Enforcement of Web Application Integrity Through Strong Typing.
WK Robertson, G Vigna
USENIX Security Symposium 9, 283-298, 2009
842009
Protecting a moving target: Addressing web application concept drift
F Maggi, W Robertson, C Kruegel, G Vigna
International Workshop on Recent Advances in Intrusion Detection, 21-40, 2009
792009
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20