Kevin Borders
Kevin Borders
Verifierad e-postadress på umich.edu - Startsida
TitelCiteras avÅr
Method, system and computer program product for detecting at least one of security threats and undesirable computer files
KR Borders
US Patent 9,055,093, 2015
3612015
Web tap: detecting covert web traffic
K Borders, A Prakash
Proceedings of the 11th ACM conference on Computer and communications …, 2004
1952004
Social networks and context-aware spam
G Brown, T Howe, M Ihbe, A Prakash, K Borders
Proceedings of the 2008 ACM conference on Computer supported cooperative …, 2008
1642008
Quantifying information leaks in outbound web traffic
K Borders, A Prakash
2009 30th IEEE Symposium on Security and Privacy, 129-140, 2009
1002009
Siren: Catching evasive malware
K Borders, X Zhao, A Prakash
2006 IEEE Symposium on Security and Privacy (S&P'06), 6 pp.-85, 2006
932006
Protecting Confidential Data on Personal Computers with Storage Capsules.
K Borders, E Vander Weele, B Lau, A Prakash
USENIX Security Symposium, 367-382, 2009
852009
Towards protecting sensitive files in a compromised system
X Zhao, K Borders, A Prakash
Third IEEE International Security in Storage Workshop (SISW'05), 8 pp.-28, 2005
702005
Method, system and computer program product for detecting security threats in a computer network
KR Borders
US Patent 8,079,080, 2011
672011
CPOL: high-performance policy evaluation
K Borders, X Zhao, A Prakash
Proceedings of the 12th ACM conference on Computer and communications …, 2005
592005
Analyzing websites for user-visible security design flaws
L Falk, A Prakash, K Borders
Proceedings of the 4th symposium on Usable privacy and security, 117-126, 2008
492008
Chimera: A declarative language for streaming network traffic analysis
K Borders, J Springer, M Burnside
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
332012
Method, system and computer program product for comparing or measuring information content in at least one data stream
KR Borders
US Patent 8,515,918, 2013
302013
Spector: Automatically analyzing shell code
K Borders, A Prakash, M Zielinski
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
262007
Svgrid: a secure virtual environment for untrusted grid applications
X Zhao, K Borders, A Prakash
Proceedings of the 3rd international workshop on Middleware for grid …, 2005
242005
Virtual machine security systems
X Zhao, K Borders, A Prakash
Advances in Computer Science and Engineering 1, 339-365, 2009
222009
Securing Network Input via a Trusted Input Proxy.
K Borders, A Prakash
HotSec, 2007
212007
Securing sensitive content in a view-only file system
K Borders, X Zhao, A Prakash
Proceedings of the ACM workshop on Digital rights management, 27-36, 2006
152006
malnets: large‐scale malicious networks via compromised wireless access points
P Traynor, K Butler, W Enck, P McDaniel, K Borders
Security and Communication Networks 3 (2‐3), 102-113, 2010
142010
OpenFire: Using deception to reduce network attacks
K Borders, L Falk, A Prakash
2007 Third International Conference on Security and Privacy in …, 2007
132007
Method, system and computer program product for creating collages that visually resemble a particular shape or group of shapes
KR Borders, JM Golden
US Patent 9,275,479, 2016
112016
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20