Kevin W. Hamlen
Orcid: 0000-0003-0479-6280
According to our database1,
Kevin W. Hamlen
authored at least 99 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Ensuring End-to-End IoT Data Security and Privacy Through Cloud-Enhanced Confidential Computing.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
2023
J. Comput. Secur., 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the First Tiny Papers Track at ICLR 2023, 2023
VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary Codes.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023
Confidential Execution of Deep Learning Inference at the Untrusted Edge with ARM TrustZone.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
2022
Proceedings of the 5th IEEE International Conference on Multimedia Information Processing and Retrieval, 2022
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022
2021
BiMorphing: A Bi-Directional Bursting Defense against Website Fingerprinting Attacks.
IEEE Trans. Dependable Secur. Comput., 2021
A fine-grained classification and security analysis of web-based virtual machine vulnerabilities.
Comput. Secur., 2021
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
2020
Exploiting the Trust Between Boundaries: Discovering Memory Corruptions in Printers via Driver-Assisted Testing.
Proceedings of the 21st ACM SIGPLAN/SIGBED International Conference on Languages, 2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020
2019
CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software.
Proceedings of the 28th USENIX Security Symposium, 2019
Better Late Than Never: An n-Variant Framework of Verification for Java Source Code on CPU x GPU Hybrid Platform.
Proceedings of the 28th International Symposium on High-Performance Parallel and Distributed Computing, 2019
Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software Transformation, 2019
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Springer, ISBN: 978-3-030-02110-8, 2019
2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Decentralized IoT Data Management Using BlockChain and Trusted Execution Environment.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018
Proceedings of the 2018 Workshop on Forming an Ecosystem Around Software Transformation, 2018
Proceedings of the Computer Security, 2018
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
2016
Searching for software diversity: attaining artificial diversity through program synthesis.
Proceedings of the 2016 New Security Paradigms Workshop, 2016
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016
2015
IEEE Trans. Dependable Secur. Comput., 2015
Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception.
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
2014
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014
2013
Int. J. Artif. Intell. Tools, 2013
Comput. Stand. Interfaces, 2013
Measuring expertise and bias in cyber security using cognitive and neuroscience approaches.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013
Subverting system authentication with context-aware, reactive virtual machine introspection.
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Secur. Informatics, 2012
J. Integr. Des. Process. Sci., 2012
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
2011
ACM Trans. Manag. Inf. Syst., 2011
Proceedings of the 2nd International Conference on Ambient Systems, 2011
Facing the reality of data stream classification: coping with scarcity of labeled data.
Knowl. Inf. Syst., 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the 5th ACM Workshop Programming Languages meets Program Verification, 2011
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2011
Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
2010
Proceedings of the IEEE International Conference on Sensor Networks, 2010
Proceedings of the Practical Aspects of Declarative Languages, 2010
Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors.
Proceedings of the 16th International Conference on Distributed Multimedia Systems, 2010
Challenges and Future Directions of Software Technology: Secure Software Development.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
Proceedings of the Cloud Computing, Second International Conference, 2010
Proceedings of the 9th International Conference on Aspect-Oriented Software Development, 2010
2009
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009
2008
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
2007
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Security Policy Enforcement by Automated Program-rewriting.
PhD thesis, 2006
ACM Trans. Program. Lang. Syst., 2006
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006