Effective Anomaly Detection with Scarce Training Data

Christopher Kruegel , Giovanni Vigna , Federico Maggi , William K. Robertson
network and distributed system security symposium 1 -16

39
2010
A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication.

Engin Kirda , Guevara Noubir , Aldo Cassola , William K. Robertson
network and distributed system security symposium

39
2013
Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions

Sajjad Arshad , Amin Kharraz , William K. Robertson
financial cryptography 441 -459

44
2016
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads

Sajjad Arshad , Christo Wilson , Muhammad Ahmad Bashir , William K. Robertson
usenix security symposium 481 -496

52
2016
Cached and Confused: Web Cache Deception in the Wild

Engin Kirda , Kaan Onarlioglu , Seyed Ali Mirheidari , Bruno Crispo
usenix security symposium 665 -682

2020
Bayesian event classification for intrusion detection

C. Kruegel , D. Mutz , W. Robertson , F. Valeur
19th Annual Computer Security Applications Conference, 2003. Proceedings. ( 19) 14 -23

294
2003
A stateful intrusion detection system for world-wide web servers

G. Vigna , W. Robertson , V. Kher , R.A. Kemmerer
19th Annual Computer Security Applications Conference, 2003. Proceedings. 34 -43

124
2003
Detecting kernel-level rootkits through binary analysis

C. Kruegel , W. Robertson , G. Vigna
annual computer security applications conference 91 -100

184
2004
Using Alert Verification to Identify Successful Intrusion Attempts

C. Kruegel , W. Robertson , G. Vigna
Praxis Der Informationsverarbeitung Und Kommunikation 27 ( 4) 219 -227

44
2004
PrivExec: Private Execution as an Operating System Service

K. Onarlioglu , C. Mulliner , W. Robertson , E. Kirda
ieee symposium on security and privacy 206 -220

23
2013
LAVA: Large-Scale Automated Vulnerability Addition

Brendan Dolan-Gavitt , Patrick Hulin , Engin Kirda , Tim Leek
2016 IEEE Symposium on Security and Privacy (SP) 110 -121

136
2016
Run-time Detection of Heap-based Overflows.

William K Robertson , Christopher Kruegel , Darren Mutz , Fredrik Valeur
LISA 3 51 -60

131
2003
Using Web Honeypots to Study the Attackers Behavior

William ROBERTSON
TELECOM ParisTech

1
2017
Securing legacy firefox extensions with SENTINEL

K Onarlıoğu , Mustafa Battal , W Robertson , E Kırda
Springer