324 results on '"Vyas Sekar"'
Search Results
2. Work-in-Progress: CANGen: Practical Synthetic CAN Traces Generation Using Deep Generative Models.
Catalog
Books, media, physical & digital resources
3. Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments.
4. SEAM-EZ: Simplifying Stateful Analytics through Visual Programming.
5. Poster: Circa: Re-imagining Network Telemetry from an Approximation-First Perspective.
6. Summary Statistic Privacy in Data Sharing.
7. TrustSketch: Trustworthy Sketch-based Telemetry on Cloud Hosts.
8. ExChain: Exception Dependency Analysis for Root Cause Diagnosis.
9. Shedding Light on Inconsistencies in Grid Cybersecurity: Disconnects and Recommendations.
10. Sketchovsky: Enabling Ensembles of Sketches on Programmable Switches.
11. ExoPlane: An Operating System for On-Rack Switch Resource Augmentation.
12. A First Look at Third-Party Service Dependencies of Web Services in Africa.
13. Network Function Capacity Reconnaissance by Remote Adversaries.
14. CANE: A Cascade Control Approach for Network-Assisted Video QoE Management.
15. Breaking Edge Shackles: Infrastructure-Free Collaborative Mobile Augmented Reality.
16. Protecting Smart Homes from Unintended Application Actions.
17. Rethinking data-driven networking with foundation models: challenges and opportunities.
18. Lumen: a framework for developing and evaluating ML-based IoT network anomaly detection.
19. Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment.
20. SketchLib: Enabling Efficient Sketch-based Monitoring on Programmable Switches.
21. Practical GAN-based synthetic IP header trace generation using NetShare.
22. On the Security of Thread Networks: Experimentation with OpenThread-Enabled Devices.
23. RareGAN: Generating Samples for Rare Classes.
24. Raising the Level of Abstraction for Time-State Analytics With the Timeline Framework.
25. Enabling Efficient and General Subpopulation Analytics in Multidimensional Data Streams.
26. Summary Statistic Privacy in Data Sharing.
27. Sketchy With a Chance of Adoption: Can Sketch-Based Telemetry Be Ready for Prime Time?
28. Watching the watchmen: Least privilege for managed network services.
29. Why Spectral Normalization Stabilizes GANs: Analysis and Improvements.
30. KalKi++: A Scalable and Extensible IoT Security Platform.
31. On the Privacy Properties of GAN-generated Samples.
32. Accurately Measuring Global Risk of Amplification Attacks using AmpMap.
33. Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating Volumetric DDoS Attacks with Programmable Switches.
34. The shape of view: an alert system for video viewership anomalies.
35. Revisiting TCP congestion control throughput models & fairness properties at scale.
36. CANNON: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers.
37. Don't Yank My Chain: Auditable NF Service Chaining.
38. Telemetry Retrieval Inaccuracy in Programmable Switches: Analysis and Recommendations.
39. RedPlane: enabling fault-tolerant stateful in-switch applications.
40. Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions.
41. Formalizing an Architectural Model of a Trustworthy Edge IoT Security Gateway‡.
42. Achieving 100Gbps Intrusion Prevention on a Single Server.
43. KalKi: A Software-Defined IoT Security Platform.
44. Using GANs for Sharing Networked Time Series Data: Challenges, Initial Promise, and Open Questions.
45. Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?
46. Joltik: enabling energy-efficient 'future-proof' analytics on low-power wide-area networks.
47. Security Analysis of Networked 3D Printers.
48. NetSMC: A Custom Symbolic Model Checker for Stateful Network Verification.
49. All that GLITTERs: Low-Power Spoof-Resilient Optical Markers for Augmented Reality.
50. Learning Context-Aware Policies from Multiple Smart Homes via Federated Multi-Task Learning.
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.