Kevin W. Hamlen

According to our database1, Kevin W. Hamlen authored at least 69 papers between 2006 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
CUDA au Coq: A Framework for Machine-validating GPU Assembly Programs.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Springer, ISBN: 978-3-030-02110-8, 2019

2018
Inscription: Thwarting ActionScript Web Attacks From Within.
Proceedings of the 17th IEEE International Conference On Trust, 2018

HoneyV: A virtualized honeynet system based on network softwarization.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Decentralized IoT Data Management Using BlockChain and Trusted Execution Environment.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018

SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks.
Proceedings of the Computer Security, 2018

Automated Threat Report Classification over Multi-Source Data.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
VisualVital: An observation model for multiple sections of scenes.
Proceedings of the 2017 IEEE SmartWorld, 2017

Efficient Multistream Classification Using Direct Density Ratio Estimation.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

FUSION: An Online Method for Multistream Classification.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Object Flow Integrity.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Unsupervised deep embedding for novel class detection over data stream.
Proceedings of the 2017 IEEE International Conference on Big Data, BigData 2017, 2017

2016
Searching for software diversity: attaining artificial diversity through program synthesis.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

A Data Driven Approach for the Science of Cyber Security: Challenges and Directions.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Adaptive encrypted traffic fingerprinting with bi-directional dependence.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

Embedded Honeypotting.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content.
IEEE Trans. Dependable Sec. Comput., 2015

Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception.
Proceedings of the 24th USENIX Security Symposium, 2015

Opaque Control-Flow Integrity.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Hippocratic binary instrumentation: First do no harm.
Sci. Comput. Program., 2014

Penny: Secure, Decentralized Data Management.
I. J. Network Security, 2014

Shingled Graph Disassembly: Finding the Undecideable Path.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

Silver Lining: Enforcing Secure Information Flow at the Cloud Edge.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Vigiles: Fine-Grained Access Control for MapReduce Systems.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

2013
Evolving Insider Threat Detection Stream Mining Perspective.
International Journal on Artificial Intelligence Tools, 2013

Data security services, solutions and standards for outsourcing.
Computer Standards & Interfaces, 2013

Measuring expertise and bias in cyber security using cognitive and neuroscience approaches.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Stealthy software: Next-generation cyber-attacks and defenses.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Computation Certification as a Service in the Cloud.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013

Subverting system authentication with context-aware, reactive virtual machine introspection.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
An economic perspective of message-dropping attacks in peer-to-peer overlays.
Security Informatics, 2012

Design and Implementation of a Data Mining System for Malware Detection.
J. Integrated Design & Process Science, 2012

Policy Enforcement Framework for Cloud Data Management.
IEEE Data Eng. Bull., 2012

Frankenstein: Stitching Malware from Benign Binaries.
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012

AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud Computing.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Aspect-Oriented Runtime Monitor Certification.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012

Cloud-Centric Assured Information Sharing.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

Binary stirring: self-randomizing instruction addresses of legacy x86 binary code.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Securing untrusted code via compiler-agnostic binary rewriting.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

Hatman: Intra-cloud Trust Management for Hadoop.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Cloud-based malware detection for evolving data streams.
ACM Trans. Management Inf. Syst., 2011

A Service-oriented Approach to Mobile Code Security.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

Facing the reality of data stream classification: coping with scarcity of labeled data.
Knowl. Inf. Syst., 2011

Secure Semantic Computing.
Int. J. Semantic Computing, 2011

Insider Threat Detection Using Stream Mining and Graph Mining.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Flexible in-lined reference monitor certification: challenges and future directions.
Proceedings of the 5th ACM Workshop Programming Languages meets Program Verification, 2011

Differentiating Code from Data in x86 Binaries.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2011

Supervised Learning for Insider Threat Detection Using Stream Mining.
Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011

Identity management for cloud computing: developments and directions.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Security Issues for Cloud Computing.
IJISP, 2010

Model-Checking In-Lined Reference Monitors.
Proceedings of the Verification, 2010

Secure Semantic Sensor Web and Pervasive Computing.
Proceedings of the IEEE International Conference on Sensor Networks, 2010

ActionScript In-Lined Reference Monitoring in Prolog.
Proceedings of the Practical Aspects of Declarative Languages, 2010

Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors.
Proceedings of the 16th International Conference on Distributed Multimedia Systems, 2010

Challenges and Future Directions of Software Technology: Secure Software Development.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

A Token-Based Access Control System for RDF Data in the Clouds.
Proceedings of the Cloud Computing, Second International Conference, 2010

Disambiguating aspect-oriented security policies.
Proceedings of the 9th International Conference on Aspect-Oriented Software Development, 2010

2009
Exploiting an antivirus interface.
Computer Standards & Interfaces, 2009

ActionScript bytecode verification with co-logic programming.
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, 2009

Enforcing IRM security policies: Two case studies.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

2008
Aspect-oriented in-lined reference monitors.
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, 2008

Data Mining for Security Applications.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Secure peer-to-peer networks for trusted collaboration.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

Centralized Security Labels in Decentralized P2P Networks.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Computability classes for enforcement mechanisms.
ACM Trans. Program. Lang. Syst., 2006

Certified In-lined Reference Monitoring on .NET.
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006


  Loading...