Shai Rubin

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

9EEShai Rubin, Somesh Jha, Barton P. Miller: Protomatching network traffic for high throughputnetwork intrusion detection. ACM Conference on Computer and Communications Security 2006: 47-58
8EEShai Rubin, Somesh Jha, Barton P. Miller: On the Completeness of Attack Mutation Algorithms. CSFW 2006: 43-56
7EEShai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd: An auctioning reputation system based on anomaly. ACM Conference on Computer and Communications Security 2005: 270-279
6EEShai Rubin, Somesh Jha, Barton P. Miller: Language-Based Generation and Evaluation of NIDS Signatures. IEEE Symposium on Security and Privacy 2005: 3-17
5EEShai Rubin, Somesh Jha, Barton P. Miller: Automatic Generation and Analysis of NIDS Attacks. ACSAC 2004: 28-38
4 Shai Rubin, Ian D. Alderman, David W. Parter, Mary K. Vernon: Foundations for Intrusion Prevention. DIMVA 2004: 143-160
3EEShai Rubin, Rastislav Bodík, Trishul M. Chilimbi: An efficient profile-analysis framework for data-layout optimizations. POPL 2002: 140-153
2EEBrian A. Fields, Shai Rubin, Rastislav Bodík: Focusing processor policies via critical-path prediction. ISCA 2001: 74-85
1 Shai Rubin, David Bernstein, Michael Rodeh: Virtual Cache Line: A New Technique to Improve Cache Exploitation for Recursive Data Structures. CC 1999: 259-273

Coauthor Index

1Ian D. Alderman [4]
2David Bernstein [1]
3Rastislav Bodík [2] [3]
4Trishul M. Chilimbi [3]
5Mihai Christodorescu [7]
6Brian A. Fields [2]
7Vinod Ganapathy [7]
8Jonathon T. Giffin [7]
9Somesh Jha [5] [6] [8] [9]
10Nicholas Kidd [7]
11Louis Kruger [7]
12Barton P. Miller [5] [6] [8] [9]
13David W. Parter [4]
14Michael Rodeh [1]
15Mary K. Vernon [4]
16Hao Wang [7]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)