BinGo: cross-architecture cross-OS binary search. | 30 | 0.79 | 2016 |
BLITZ: Compositional bounded model checking for real-world programs | 14 | 0.54 | 2013 |
MACE: model-inference-assisted concolic exploration for protocol and vulnerability discovery | 32 | 1.05 | 2011 |
Insights from the inside: a view of botnet management from infiltration | 37 | 2.10 | 2010 |
Inference and analysis of formal models of botnet command and control protocols | 62 | 1.93 | 2010 |
Identifying unique devices through wireless fingerprinting | 59 | 2.62 | 2008 |
Network Forensics on Packet Fingerprints | 12 | 1.00 | 2006 |
A framework and source model for design and evaluation of robust header compression | 2 | 0.37 | 2006 |
Modeling and analysis of robust header compression performance | 2 | 0.43 | 2005 |
Exploiting inter-flow redundancy: context replication in ROHC-TCP | 1 | 0.36 | 2004 |