×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [wenke lee]
Documents
CERCS - Creating System Solutions for Future Technologies
638 views
Documents
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks
234 views
Documents
2008-7-31 Guofei Gu BotMiner BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Guofei Gu 1,2,
215 views
Documents
Secure In-VM Monitoring Using Hardware Virtualization Monirul Sharif, Wenke Lee, Weidong Cui, and Andrea Lanzi Presented by Tyler Bletsch
223 views
Documents
Mimesis Aegis: A Mimicry Privacy Shield A System's Approach to Data Privacy on Public Cloud Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke
216 views
Documents
Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee and Guofei Jiang CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerability
220 views
Documents
1 Polymorphic Blending Attacks By Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg Kolesnikov and Wenke Lee Presented by Jelena Mirkovic Topic 1
230 views
Documents
Intrusion Detection Techniques for Mobile Wireless Networks Authors: Yongguang Zhang, HRL Laboratories LLC, Malibu, California. Wenke Lee, College of Computing,
215 views
Documents
Building a Scalable System for StealthyP2P-Botnet Detection
45 views
Documents
Mobile Device Security Challenges Mustaque Ahamad, Director, Georgia Tech Information Security Center Patricia Titus, VP and Global Chief Information
223 views
Documents
Botnet and Spam Detection in High-Speed Networks
105 views
Documents
Mimesis Aegis: A Mimicry Privacy Shield A System's Approach to Data Privacy on Public Cloud
69 views
Next >