dblp.uni-trier.dewww.uni-trier.de

Kevin Borders

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
11EEGarrett Brown, Travis Howe, Micheal Ihbe, Atul Prakash, Kevin Borders: Social networks and context-aware spam. CSCW 2008: 403-412
10EEKevin Borders, Atul Prakash: Towards Quantification of Network-Based Information Leaks via HTTP. HotSec 2008
9EEXin Zhao, Kevin Borders, Atul Prakash: Prism: Providing Flexible and Fast Filesystem Cloning Service for Virtual Servers. Middleware 2008: 388-407
8EELaura Falk, Atul Prakash, Kevin Borders: Analyzing websites for user-visible security design flaws. SOUPS 2008: 117-126
2007
7EEKevin Borders, Atul Prakash, Mark Zielinski: Spector: Automatically Analyzing Shell Code. ACSAC 2007: 501-514
6EEXin Zhao, Kevin Borders, Atul Prakash: Using a virtual machine to protect sensitive Grid resources. Concurrency and Computation: Practice and Experience 19(14): 1917-1935 (2007)
2006
5EEKevin Borders, Xin Zhao, Atul Prakash: Securing sensitive content in a view-only file system. Digital Rights Management Workshop 2006: 27-36
4EEKevin Borders, Xin Zhao, Atul Prakash: Siren: Catching Evasive Malware (Short Paper). IEEE Symposium on Security and Privacy 2006: 78-85
2005
3EEKevin Borders, Xin Zhao, Atul Prakash: CPOL: high-performance policy evaluation. ACM Conference on Computer and Communications Security 2005: 147-157
2EEXin Zhao, Kevin Borders, Atul Prakash: Towards Protecting Sensitive Files in a Compromised System. IEEE Security in Storage Workshop 2005: 21-28
2004
1EEKevin Borders, Atul Prakash: Web tap: detecting covert web traffic. ACM Conference on Computer and Communications Security 2004: 110-120

Coauthor Index

1Garrett Brown [11]
2Laura Falk [8]
3Travis Howe [11]
4Micheal Ihbe [11]
5Atul Prakash [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11]
6Xin Zhao [2] [3] [4] [5] [6] [9]
7Mark Zielinski [7]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)