Phillip A. Porras
Orcid: 0000-0003-4661-2443Affiliations:
- SRI International, Menlo Park, CA, USA
According to our database1,
Phillip A. Porras
authored at least 85 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Enhancing security in SDN: Systematizing attacks and defenses from a penetration perspective.
Comput. Networks, 2024
2023
IEEE/ACM Trans. Netw., April, 2023
Extended data plane architecture for in-network security services in software-defined networks.
Comput. Secur., 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 6th on European P4 Workshop, 2023
2022
IEEE/ACM Trans. Netw., 2022
A fine-grained telemetry stream for security services in 5G open radio access networks.
Proceedings of the 1st International Workshop on Emerging Topics in Wireless, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Scalable Microservice Forensics and Stability Assessment Using Variational Autoencoders.
CoRR, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Comput. Secur., 2020
Proceedings of the 2020 USENIX Annual Technical Conference, 2020
AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
2019
IEEE/ACM Trans. Netw., 2019
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
2017
IEEE/ACM Trans. Netw., 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017
Securing Ultra-High-Bandwidth Science DMZ Networks with Coordinated Situational Awareness.
Proceedings of the 16th ACM Workshop on Hot Topics in Networks, Palo Alto, CA, USA, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Bridging the architectural gap between NOS design principles in software-defined networks.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
ATOL: A Framework for Automated Analysis and Categorization of the Darkweb Ecosystem.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017
2016
IEEE/ACM Trans. Netw., 2016
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
2014
DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications.
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the ACM SIGCOMM 2013 Conference, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of IEEE International Conference on Communications, 2013
AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012
Proceedings of the first workshop on Hot topics in software defined networks, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement.
Proceedings of the Computer Aided Verification - 24th International Conference, 2012
2011
A comparative assessment of malware classification using binary texture analysis and dynamic analysis.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Stat. Anal. Data Min., 2010
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Proceedings of the Computer Security, 2008
2007
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Proceedings of the 3rd Workshop on Steps to Reducing Unwanted Traffic on the Internet, 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Computer Safety, 2007
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
2006
Large-scale collection and sanitization of network security data: risks and challenges.
Proceedings of the New Security Paradigms Workshop 2006, 2006
Automatically deducing propagation sequences that circumvent a collaborative worm defense.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
2005
Proceedings of the 19th Workshop on Parallel and Distributed Simulation, 2005
2004
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
2003
Proceedings of the 2003 ACM Workshop on Rapid Malcode, 2003
2002
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002
Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), 2002
2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
1999
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST).
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999
Proceedings of the 1999 IEEE/IFIP International Symposium on Integrated Network Management, 1999
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, 1999
1998
Proceedings of the Network and Distributed System Security Symposium, 1998
1996
IEEE Trans. Software Eng., 1996
1995
IEEE Trans. Software Eng., 1995
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995
1992
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992
1991
IEEE Trans. Software Eng., 1991
Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991