Fernando C. Colón Osorio

Affiliations:
  • Brandeis University


According to our database1, Fernando C. Colón Osorio authored at least 16 papers between 1985 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Message from the general program chair.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

2015
Segmented sandboxing - A novel approach to Malware polymorphism detection.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

2014
Protection against remote code execution exploits of popular applications in Windows.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

Combining commercial consensus and community crowd-sourced categorization of web sites for integrity against phishing and other web fraud.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

Global and local prevalence weighting of missed attack sample impacts for endpoint security product comparative detection testing.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

2013
Static malware detection with Segmented Sandboxing.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013

Measuring the effectiveness of modern security products to detect and contain emerging threats - A consensus-based approach.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013

2012
"TrustDroid™": Preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint tracking.
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012

2010
Overcoming the limitations in computer worm models.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

2008
State of wireless security implementations in the United States and Europe - empirical data.
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008

2007
Using Byzantine Agreement in the Design Of IPS Systems.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

2006
An initial analysis and presentation of malware exhibiting swarm-like behavior.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

A stratified model for security in peer networks: a case for fine grain granularity.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

And you though you were safe after SLAMMER, not so, swarms not Zombies present the greatest risk to our national Internet infrastructure.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

2005
Measuring energy-security tradeoffs in wireless networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

1985
The Microarchitecture of the VAX 8600.
Proceedings of the Spring COMPCON'85, 1985


  Loading...