Teryl Taylor
Orcid: 0000-0002-4915-1286
  According to our database1,
  Teryl Taylor
  authored at least 24 papers
  between 2007 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
    Proceedings of the 4th Workshop on Practical Adoption Challenges of ML for Systems, 2025
    
  
  2024
Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call Specialization.
    
  
    Proceedings of the IEEE Symposium on Security and Privacy, 2024
    
  
    Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
    
  
  2023
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses.
    
  
    Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
    
  
  2022
    Proceedings of the 31st International Conference on Computer Communications and Networks, 2022
    
  
    Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022
    
  
    Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
    
  
  2021
  2020
    Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020
    
  
    Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
    
  
  2018
    Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
    
  
    Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
    
  
    Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018
    
  
  2017
    Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
    
  
  2016
Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire.
    
  
    Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
    
  
    Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
    
  
    Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
    
  
  2013
Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing.
    
  
    Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
    
  
    Proceedings of the 4th International Conference on Ambient Systems, 2013
    
  
  2012
    Proceedings of the 2012 USENIX Annual Technical Conference, 2012
    
  
  2010
    Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
    
  
  2009
    Proceedings of the 6th International Workshop on Visualization for Cyber Security, 2009
    
  
  2007
NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior.
    
  
    Proceedings of the 4th International Workshop on Visualization for Computer Security, 2007