Teryl Taylor

According to our database1, Teryl Taylor authored at least 23 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Manipulating OpenFlow Link Discovery Packet Forwarding for Topology Poisoning.
CoRR, 2024

Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call Specialization.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Evaluating Feature Robustness for Windows Malware Family Classification.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

Malware Family Classification via Residual Prefetch Artifacts.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
Evidential Cyber Threat Hunting.
CoRR, 2021

2020
Improving cybersecurity hygiene through JIT patching.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Towards an Open Format for Scalable System Telemetry.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2018
Cross-Stack Threat Sensing for Cyber Security and Resilience.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

Dressed up: Baiting Attackers through Endpoint Service Projection.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

2017
POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Using Context to Improve Network-based Exploit Kit Detection.
PhD thesis, 2016

Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

BotMeter: Charting DGA-Botnet Landscapes in Large Networks.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Detecting Malicious Exploit Kits using Tree-based Similarity Searches.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2013
Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Stability Visualizations as a Low-complexity Descriptor of Network Host Behaviour.
Proceedings of the 4th International Conference on Ambient Systems, 2013

2012
Toward Efficient Querying of Compressed Network Payloads.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

2010
Cuckoo bags for exploring multikey data.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Over flow: An overview visualization for network analysis.
Proceedings of the 6th International Workshop on Visualization for Cyber Security, 2009

2007
NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior.
Proceedings of the 4th International Workshop on Visualization for Computer Security, 2007


  Loading...