Teryl Taylor
According to our database1,
Teryl Taylor
authored at least 23 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call Specialization.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
2022
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
2021
2020
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018
2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2013
Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
Proceedings of the 4th International Conference on Ambient Systems, 2013
2012
Proceedings of the 2012 USENIX Annual Technical Conference, 2012
2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
2009
Proceedings of the 6th International Workshop on Visualization for Cyber Security, 2009
2007
NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior.
Proceedings of the 4th International Workshop on Visualization for Computer Security, 2007