Seguir
Stefan Savage
Stefan Savage
Professor of Computer Science and Engineering, UC San Diego
Dirección de correo verificada de cs.ucsd.edu - Página principal
Título
Citado por
Citado por
Año
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
T Ristenpart, E Tromer, H Shacham, S Savage
Proceedings of the 16th ACM conference on Computer and communications …, 2009
30412009
Experimental security analysis of a modern automobile
K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ...
2010 IEEE symposium on security and privacy, 447-462, 2010
25792010
Comprehensive experimental analyses of automotive attack surfaces
S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ...
20th USENIX security symposium (USENIX Security 11), 2011
23142011
Inferring internet denial-of-service activity
D Moore, C Shannon, DJ Brown, GM Voelker, S Savage
ACM Transactions on Computer Systems (TOCS) 24 (2), 115-139, 2006
22312006
Eraser: A dynamic data race detector for multithreaded programs
S Savage, M Burrows, G Nelson, P Sobalvarro, T Anderson
ACM Transactions on Computer Systems (TOCS) 15 (4), 391-411, 1997
21121997
Practical network support for IP traceback
S Savage, D Wetherall, A Karlin, T Anderson
Proceedings of the conference on Applications, Technologies, Architectures …, 2000
20382000
A fistful of bitcoins: characterizing payments among men with no names
S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ...
Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013
19182013
Inside the Slammer Worm
D Moore, V Paxson, S Savage, C Shannon, S Staniford
IEEE Magazine of Security and Privacy, 33-39, 2003
1781*2003
Extensibility safety and performance in the SPIN operating system
BN Bershad, S Savage, P Pardyak, EG Sirer, ME Fiuczynski, D Becker, ...
Proceedings of the fifteenth ACM symposium on Operating systems principles …, 1995
15901995
Beyond blacklists: learning to detect malicious web sites from suspicious URLs
J Ma, LK Saul, S Savage, GM Voelker
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
11802009
Automated Worm Fingerprinting.
S Singh, C Estan, G Varghese, S Savage
OSDI 4, 4-4, 2004
11462004
802.11 {Denial-of-Service} attacks: Real vulnerabilities and practical solutions
J Bellardo, S Savage
12th USENIX security symposium (USENIX Security 03), 2003
10962003
Internet quarantine: Requirements for containing self-propagating code
D Moore, C Shannon, GM Voelker, S Savage
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
10902003
Network support for IP traceback
S Savage, D Wetherall, A Karlin, T Anderson
IEEE/ACM transactions on networking 9 (3), 226-237, 2001
9112001
Measuring the cost of cybercrime
R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ...
The economics of information security and privacy, 265-300, 2013
8422013
Identifying suspicious URLs: an application of large-scale online learning
J Ma, LK Saul, S Savage, GM Voelker
Proceedings of the 26th annual international conference on machine learning …, 2009
8022009
Return-oriented programming: Systems, languages, and applications
R Roemer, E Buchanan, H Shacham, S Savage
ACM Transactions on Information and System Security (TISSEC) 15 (1), 1-34, 2012
8002012
Understanding availability
R Bhagwan, S Savage, GM Voelker
Peer-to-Peer Systems II: Second International Workshop, IPTPS 2003, Berkeley …, 2003
8002003
Modeling TCP latency
N Cardwell, S Savage, T Anderson
Proceedings IEEE INFOCOM 2000. Conference on Computer Communications …, 2000
7712000
SyncScan: practical fast handoff for 802.11 infrastructure networks
I Ramani, S Savage
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005
7652005
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20