According to our database1, Anna Shubina authored at least 21 papers between 2003 and 2017.
Legend:Book In proceedings Article PhD thesis Other
login Usenix Mag., 2017
Why Wassenaar Arrangement's Definitions of "Intrusion Software" and "Controlled Items" Put Security Research and Defense At Risk.
login Usenix Mag., 2014
IEEE Secur. Priv., 2014
Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation.
login Usenix Mag., 2011
Automated mapping of large binary objects using primitive fragment type classification.
Digit. Investig., 2010
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the 41st ACM technical symposium on Computer science education, 2010
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010
The diversity of TPMs and its effects on development: a case study of integrating the TPM into OpenSolaris.
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008
Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract).
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the Mathematical Foundations of Computer Science 2007, 2007
Proceedings of the Second Annual Conference on Privacy, 2004