Follow
Yunsen Lei
Title
Cited by
Cited by
Year
Can Host-Based SDNs Rival the Traffic Engineering Abilities of Switch-Based SDNs?
Y Lei, JP Lanson, RM Kaldawy, J Estrada, CA Shue
2020 11th International Conference on Network of the Future (NoF), 91-99, 2020
42020
Detecting root-level endpoint sensor compromises with correlated activity
Y Lei, CA Shue
Security and Privacy in Communication Networks: 15th EAI International …, 2019
42019
Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems
MM Tolbert, EM Hess, MC Nascimento, Y Lei, CA Shue
International Conference on Information and Communications Security, 184-200, 2022
32022
Visualizing web application execution logs to improve software security defect localization
MA Puentes, Y Lei, N Rakotondravony, LT Harrison, CA Shue
2022 IEEE International Conference on Software Analysis, Evolution and …, 2022
32022
By Your Command: Extracting the User Actions that Create Network Flows in Android
S Liu, JP Petitti, Y Lei, Y Liu, CA Shue
2023 14th International Conference on Network of the Future (NoF), 118-122, 2023
12023
Attackers as Instructors: Using Container Isolation to Reduce Risk and Understand Vulnerabilities
Y Lei, JP Lanson, CA Shue, TW Wood
International Conference on Detection of Intrusions and Malware, and …, 2023
12023
Towards Better Kernel and Network Monitoring of Software Actions
Y Lei
Worcester Polytechnic Institute,, 2020
12020
Method and apparatus for identifying a logic defect in an application
C Shue, J Lanson, L Harrison, Y Lei, M Puentes
US Patent App. 17/939,254, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–8