Shai Rubin

According to our database1, Shai Rubin authored at least 12 papers between 1999 and 2007.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2007
Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?
Proceedings of the Malware Detection, 2007

2006
On the Completeness of Attack Mutation Algorithms.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

Protomatching network traffic for high throughputnetwork intrusion detection.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
Language-Based Generation and Evaluation of NIDS Signatures.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

An auctioning reputation system based on anomaly.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Foundations for Intrusion Prevention.
Prax. Inf.verarb. Kommun., 2004

Foundations for Intrusion Prevention.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004

Automatic Generation and Analysis of NIDS Attacks.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2002
An efficient profile-analysis framework for data-layout optimizations.
Proceedings of the Conference Record of POPL 2002: The 29th SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2002

2001
Focusing processor policies via critical-path prediction.
Proceedings of the 28th Annual International Symposium on Computer Architecture, 2001

1999
Fast construction of test-program generators for digital signal processors.
Proceedings of the 1999 IEEE International Conference on Acoustics, 1999

Virtual Cache Line: A New Technique to Improve Cache Exploitation for Recursive Data Structures.
Proceedings of the Compiler Construction, 8th International Conference, 1999


  Loading...