Search
for Author
All Reviews
Savage, Stefan
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
4
of
4
reviews
Improving software diagnosability via log enhancement
Yuan D., Zheng J., Park S., Zhou Y., Savage S. ACM Transactions on Computer Systems 30(1): 1-28, 2012. Type: Article
When a software system fails at a user site, information is often automatically sent to the developer for diagnostics. Usually, only a system log is included, with all the confidential data such as identities and financial information ...
...
Jul 6 2012
Privacy-preserving network forensics
Afanasyev M., Kohno T., Ma J., Murphy N., Savage S., Snoeren A., Voelker G. Communications of the ACM 54(5): 78-87, 2011. Type: Article
The Internet offers users some anonymity; at the network level, an Internet protocol (IP) address is only loosely associated with a device, and is not associated with a person. This article proposes the use of group signatures to bind ...
...
Jul 18 2011
Beyond heuristics: learning to classify vulnerabilities and predict exploits
Bozorgi M., Saul L., Savage S., Voelker G. KDD 2010 (Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, Jul 25-28, 2010) 105-114, 2010. Type: Proceedings
Machine learning techniques are being applied to all kinds of problems in computer science. This paper applies machine learning to classifying vulnerabilities and predicting time to exploit a vulnerability, once information on it has b...
...
Nov 10 2010
Beyond blacklists: learning to detect malicious Web sites from suspicious URLs
Ma J., Saul L., Savage S., Voelker G. KDD 2009 (Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, Jun 28-Jul 1, 2009) 1245-1254, 2009. Type: Proceedings
Detecting malicious Web sites is an ongoing concern. This paper describes an “automated [uniform resource locator (URL)] classification, using statistical methods to discover the tell-tale lexical and host-based properties&am...
...
Mar 9 2010
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy