2006 |
9 | EE | Shai Rubin,
Somesh Jha,
Barton P. Miller:
Protomatching network traffic for high throughputnetwork intrusion detection.
ACM Conference on Computer and Communications Security 2006: 47-58 |
8 | EE | Shai Rubin,
Somesh Jha,
Barton P. Miller:
On the Completeness of Attack Mutation Algorithms.
CSFW 2006: 43-56 |
2005 |
7 | EE | Shai Rubin,
Mihai Christodorescu,
Vinod Ganapathy,
Jonathon T. Giffin,
Louis Kruger,
Hao Wang,
Nicholas Kidd:
An auctioning reputation system based on anomaly.
ACM Conference on Computer and Communications Security 2005: 270-279 |
6 | EE | Shai Rubin,
Somesh Jha,
Barton P. Miller:
Language-Based Generation and Evaluation of NIDS Signatures.
IEEE Symposium on Security and Privacy 2005: 3-17 |
2004 |
5 | EE | Shai Rubin,
Somesh Jha,
Barton P. Miller:
Automatic Generation and Analysis of NIDS Attacks.
ACSAC 2004: 28-38 |
4 | | Shai Rubin,
Ian D. Alderman,
David W. Parter,
Mary K. Vernon:
Foundations for Intrusion Prevention.
DIMVA 2004: 143-160 |
2002 |
3 | EE | Shai Rubin,
Rastislav Bodík,
Trishul M. Chilimbi:
An efficient profile-analysis framework for data-layout optimizations.
POPL 2002: 140-153 |
2001 |
2 | EE | Brian A. Fields,
Shai Rubin,
Rastislav Bodík:
Focusing processor policies via critical-path prediction.
ISCA 2001: 74-85 |
1999 |
1 | | Shai Rubin,
David Bernstein,
Michael Rodeh:
Virtual Cache Line: A New Technique to Improve Cache Exploitation for Recursive Data Structures.
CC 1999: 259-273 |