Kevin W. Hamlen
Kevin W. Hamlen
Eugene McDermott Professor of Computer Science, The University of Texas at Dallas
Email confirmado em - Página inicial
Citado por
Citado por
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Security issues for cloud computing
K Hamlen, M Kantarcioglu, L Khan, B Thuraisingham
International Journal of Information Security and Privacy (IJISP) 4 (2), 36-48, 2010
Computability classes for enforcement mechanisms
KW Hamlen, G Morrisett, FB Schneider
ACM Transactions on Programming Languages and Systems (TOPLAS) 28 (1), 175-205, 2006
Opaque Control-Flow Integrity.
V Mohan, P Larsen, S Brunthaler, KW Hamlen, M Franz
NDSS 26, 27-30, 2015
Flow-based identification of botnet traffic by mining multiple log files
MM Masud, T Al-Khateeb, L Khan, B Thuraisingham, KW Hamlen
2008 first international conference on distributed framework and …, 2008
Facing the reality of data stream classification: coping with scarcity of labeled data
MM Masud, C Woolam, J Gao, L Khan, J Han, KW Hamlen, NC Oza
Knowledge and information systems 33 (1), 213-244, 2012
Certified in-lined reference monitoring on. net
KW Hamlen, G Morrisett, FB Schneider
Proceedings of the 2006 workshop on Programming languages and analysis for …, 2006
From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation
F Araujo, KW Hamlen, S Biedermann, S Katzenbeisser
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
Differentiating code from data in x86 binaries
R Wartell, Y Zhou, KW Hamlen, M Kantarcioglu, B Thuraisingham
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2011
Aspect-oriented in-lined reference monitors
KW Hamlen, M Jones
Proceedings of the third ACM SIGPLAN workshop on Programming languages and …, 2008
Hatman: Intra-cloud trust management for Hadoop
SM Khan, KW Hamlen
2012 IEEE Fifth International Conference on Cloud Computing, 494-501, 2012
Securing untrusted code via compiler-agnostic binary rewriting
R Wartell, V Mohan, KW Hamlen, Z Lin
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
Decentralized IoT data management using blockchain and trusted execution environment
G Ayoade, V Karande, L Khan, K Hamlen
2018 IEEE International Conference on Information Reuse and Integration (IRI …, 2018
On the Trusted Use of Large-Scale Personal Data.
YA de Montjoye, SS Wang, A Pentland, DTT Anh, A Datta
IEEE Data Eng. Bull. 35 (4), 5-8, 2012
Cloud-based malware detection for evolving data streams
MM Masud, TM Al-Khateeb, KW Hamlen, J Gao, L Khan, J Han, ...
ACM transactions on management information systems (TMIS) 2 (3), 1-27, 2011
Insider threat detection using stream mining and graph mining
P Parveen, J Evans, B Thuraisingham, KW Hamlen, L Khan
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.
E Bauman, Z Lin, KW Hamlen
NDSS, 2018
AnonymousCloud: A data ownership privacy provider framework in cloud computing
SM Khan, KW Hamlen
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
Data mining for security applications
B Thuraisingham, L Khan, MM Masud, KW Hamlen
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2008
Seismic: Secure in-lined script monitors for interrupting cryptojacks
W Wang, B Ferrell, X Xu, KW Hamlen, S Hao
European Symposium on Research in Computer Security, 122-142, 2018
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20