Publications

Found 271 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is V  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Al-Fares, M.., Radhakrishnan S., Raghavan B., Huang N.., & Vahdat A. (2010).  Hedera: Dynamic Flow Scheduling for Data Center Networks.
Akhawe, D., Amann J., Vallentin M., & Sommer R. (2013).  Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web.
Valente, F., Magimai-Doss M., Plahl C., & Ravuri S. (2009).  Hierarchical Processing of the Modulation Spectrum for GALE Mandarin LVCSR System. 2963-2966.
Sommer, R., De Carli L., Kothari N., Vallentin M., & Paxson V. (2012).  HILTI: An Abstract Execution Environment for Concurrent, Stateful Network Traffic Analysis.
Sommer, R., Vallentin M., De Carli L., & Paxson V. (2014).  HILTI: An Abstract Execution Environment for Deep, Stateful Network Traffic Analysis.
Ho, G., Dhiman M., Akhawe D., Paxson V., Savage S., Voelker G. M., et al. (2021).  Hopper: Modeling and Detecting Lateral Movement. Proceedings of the 30th USENIX Security Symposium. 3093-3110.
Pal, J., Lyman P., Varian H. R., Charles P., Good N., Jordan L. Lamar, et al. (2003).  How Much Information.
Kapravelos, A., Grier C., Chachra N., Kruegel C., Vigna G., & Paxson V. (2014).  Hulk: Eliciting Malicious Behavior in Browser Extensions.
Orr, R., & van Leeuwen D. A. (2009).  A Human Benchmark for Language Recognition. 2175-2178.
Vaquero, C.., Vinyals O., & Friedland G. (2010).  A Hybrid Approach to Online Speaker Diarization. 2642-2645.
Vaquero, C.., Vinyals O., & Friedland G. (2010).  A Hybrid Approach to Online Speaker Diarization. 2642-2645.

Pages