Phuong Cao

Orcid: 0000-0001-6028-0583

According to our database1, Phuong Cao authored at least 23 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Jupyter Notebook Attacks Taxonomy: Ransomware, Data Exfiltration, and Security Misconfiguration.
CoRR, 2024

Security Testbed for Preempting Attacks against Supercomputing Infrastructure.
CoRR, 2024

Dependable Classical-Quantum Computer Systems Engineering.
CoRR, 2024

Post-Quantum Cryptography (PQC) Network Instrument: Measuring PQC Adoption Rates and Identifying Migration Pathways.
CoRR, 2024

True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center.
Proceedings of the 33rd USENIX Security Symposium, 2024

Deep Generative Attacks and Countermeasures for Data-Driven Offline Signature Verification.
Proceedings of the IEEE International Joint Conference on Biometrics, 2024

2023
Taxonomy of Fingerprinting Techniques for Evaluation of Smart Grid Honeypot Realism.
Proceedings of the IEEE International Conference on Communications, 2023

Design of a Configurable 16-Electrode Sense and Stimulation Neuromodulation System.
Proceedings of the 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2023

stealthML: Data-driven Malware for Stealthy Data Exfiltration.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Fall Prediction in People with Parkinson's Disease.
Proceedings of the 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2022

2020
Investigating Root Causes of Authentication Failures Using a SAML and OIDC Observatory.
Proceedings of the 6th IEEE International Conference on Dependability in Sensor, 2020

2019
On Preempting Advanced Persistent Threats Using Probabilistic Graphical Models.
CoRR, 2019

CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks.
Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation, 2019

TRACTION: an infrastructure for trusted alert sharing and collaborative mitigation.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

2017
SVAuth - A Single-Sign-On Integration Solution with Runtime Verification.
Proceedings of the Runtime Verification - 17th International Conference, 2017

2016
A framework for generation, replay, and analysis of real-world attack variants.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

2015
Towards an unified security testbed and security analytics framework.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Preemptive intrusion detection: theoretical framework and real-world measurements.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

2014
Building Reliable and Secure Virtual Machines Using Architectural Invariants.
IEEE Secur. Priv., 2014

Personalized password guessing: a new security threat.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Preemptive intrusion detection.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2012
Toward a high availability cloud: Techniques and challenges.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012


  Loading...