Phuong Cao
Title
Cited by
Cited by
Year
Reliability and security monitoring of virtual machines using hardware architectural invariants
C Pham, ZJ Estrada, P Cao, Z Kalbarczyk, RK Iyer
44th IEEE International Conference on Dependable Systems and Networks (DSN), 2014
472014
Preemptive intrusion detection: Theoretical framework and real-world measurements
P Cao, E Badger, Z Kalbarczyk, R Iyer, A Slagell
ACM Symposium and Bootcamp on the Science of Security (HotSoS), 2015
372015
Toward a high availability cloud: Techniques and challenges
C Pham, P Cao, Z Kalbarczyk, RK Iyer
42nd IEEE International Conference on Dependable Systems and Networks (DSN), 2012
312012
CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks
PM Cao, Y Wu, SS Banerjee, J Azoff, A Withers, ZT Kalbarczyk, RK Iyer
16th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2019
112019
Preemptive intrusion detection
P Cao, K Chung, Z Kalbarczyk, R Iyer, AJ Slagell
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 1-2, 2014
92014
Towards an unified security testbed and security analytics framework
P Cao, EC Badger, ZT Kalbarczyk, RK Iyer, A Withers, AJ Slagell
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 24, 2015
82015
Building reliable and secure virtual machines using architectural invariants
C Pham, ZJ Estrada, P Cao, Z Kalbarczyk, RK Iyer
IEEE Security & Privacy Magazine (S&P), 2014
72014
Personalized password guessing: a new security threat
P Cao, H Li, K Nahrstedt, Z Kalbarczyk, R Iyer, AJ Slagell
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 22, 2014
72014
On preempting advanced persistent threats using probabilistic graphical models
P Cao
arXiv preprint arXiv:1903.08826, 2019
32019
A framework for generation, replay, and analysis of real-world attack variants
P Cao, EC Badger, ZT Kalbarczyk, RK Iyer
Proceedings of the Symposium and Bootcamp on the Science of Security, 28-37, 2016
22016
An experiment using factor graph for early attack detection
P Cao
22015
SVAuth–A Single-Sign-On Integration Solution with Runtime Verification
S Chen, M McCutchen, P Cao, S Qadeer, RK Iyer
International Conference on Runtime Verification (RV), 349-358, 2017
12017
Investigating Root Causes of Authentication Failures Using a SAML and OIDC Observatory
J Basney, P Cao, T Fleury
2020 IEEE 6th International Conference on Dependability in Sensor, Cloud and …, 2020
2020
Mining Threat Intelligence from Billion-scale SSH Brute-Force Attacks
Y Wu, PM Cao, A Withers, ZT Kalbarczyk, RK Iyer
2020
TRACTION: an infrastructure for trusted alert sharing and collaborative mitigation
K Chung, P Cao, Y Wu, ZT Kalbarczyk, RK Iyer, A Withers
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of …, 2019
2019
Poster: Mining Threat Intelligence from Billion-scale SSH Brute-Force Attacks
Y Wu, P Cao, A Withers, ZT Kalbarczyk, RK Iyer
Security Testbed: Scalable Infrastructure for Interactive Attack Replay and Testing of Security Monitoring Tools
SK Kim, S Bakshi, P Cao, EC Badger, ZT Kalbarczyk, RK Iyer
Scalable Data Analytics Pipeline for Validation of Real-Time Attack Detection
E Badger
The system can't perform the operation now. Try again later.
Articles 1–18