Stefan Savage
Stefan Savage
Professor of Computer Science and Engineering, UC San Diego
Dirección de correo verificada de cs.ucsd.edu - Página principal
Título
Citado por
Citado por
Año
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
T Ristenpart, E Tromer, H Shacham, S Savage
Proceedings of the 16th ACM conference on Computer and communications …, 2009
23702009
Inferring internet denial-of-service activity
D Moore, C Shannon, DJ Brown, GM Voelker, S Savage
ACM Transactions on Computer Systems (TOCS) 24 (2), 115-139, 2006
19752006
Practical network support for IP traceback
S Savage, D Wetherall, A Karlin, T Anderson
Proceedings of the conference on Applications, Technologies, Architectures …, 2000
18822000
Eraser: A dynamic data race detector for multithreaded programs
S Savage, M Burrows, G Nelson, P Sobalvarro, T Anderson
ACM Transactions on Computer Systems (TOCS) 15 (4), 391-411, 1997
17891997
Inside the Slammer Worm
D Moore, V Paxson, S Savage, C Shannon, S Staniford
IEEE Magazine of Security and Privacy, 33-39, 2003
1583*2003
Experimental security analysis of a modern automobile
K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ...
2010 IEEE Symposium on Security and Privacy, 447-462, 2010
15172010
Extensibility safety and performance in the SPIN operating system
BN Bershad, S Savage, P Pardyak, EG Sirer, ME Fiuczynski, D Becker, ...
Proceedings of the fifteenth ACM symposium on Operating systems principles …, 1995
14621995
Comprehensive experimental analyses of automotive attack surfaces.
S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ...
USENIX Security Symposium 4, 447-462, 2011
12992011
Automated Worm Fingerprinting.
S Singh, C Estan, G Varghese, S Savage
OSDI 4, 4-4, 2004
9752004
Internet quarantine: Requirements for containing self-propagating code
D Moore, C Shannon, GM Voelker, S Savage
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003
9312003
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions.
J Bellardo, S Savage
USENIX security symposium 12, 2-2, 2003
9202003
A fistful of bitcoins: characterizing payments among men with no names
S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ...
Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013
9092013
Network support for IP traceback
S Savage, D Wetherall, A Karlin, T Anderson
IEEE/ACM transactions on networking 9 (3), 226-237, 2001
8312001
Beyond blacklists: learning to detect malicious web sites from suspicious URLs
J Ma, LK Saul, S Savage, GM Voelker
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
8132009
Understanding availability
R Bhagwan, S Savage, GM Voelker
International Workshop on Peer-to-Peer Systems, 256-267, 2003
7292003
SyncScan: practical fast handoff for 802.11 infrastructure networks
I Ramani, S Savage
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005
7032005
Modeling TCP latency
N Cardwell, S Savage, T Anderson
Proceedings IEEE INFOCOM 2000. Conference on Computer Communications …, 2000
6982000
The end-to-end effects of Internet path selection
S Savage, A Collins, E Hoffman, J Snell, T Anderson
Proceedings of the conference on Applications, technologies, architectures …, 1999
6891999
Total Recall: System Support for Automated Availability Management.
R Bhagwan, K Tati, Y Cheng, S Savage, GM Voelker
Nsdi 4, 25-25, 2004
6552004
Identifying suspicious URLs: an application of large-scale online learning
J Ma, LK Saul, S Savage, GM Voelker
Proceedings of the 26th annual international conference on machine learning …, 2009
5522009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20