Can Host-Based SDNs Rival the Traffic Engineering Abilities of Switch-Based SDNs? Y Lei, JP Lanson, RM Kaldawy, J Estrada, CA Shue 2020 11th International Conference on Network of the Future (NoF), 91-99, 2020 | 4 | 2020 |
Detecting root-level endpoint sensor compromises with correlated activity Y Lei, CA Shue Security and Privacy in Communication Networks: 15th EAI International …, 2019 | 4 | 2019 |
Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems MM Tolbert, EM Hess, MC Nascimento, Y Lei, CA Shue International Conference on Information and Communications Security, 184-200, 2022 | 3 | 2022 |
Visualizing web application execution logs to improve software security defect localization MA Puentes, Y Lei, N Rakotondravony, LT Harrison, CA Shue 2022 IEEE International Conference on Software Analysis, Evolution and …, 2022 | 3 | 2022 |
By Your Command: Extracting the User Actions that Create Network Flows in Android S Liu, JP Petitti, Y Lei, Y Liu, CA Shue 2023 14th International Conference on Network of the Future (NoF), 118-122, 2023 | 1 | 2023 |
Attackers as Instructors: Using Container Isolation to Reduce Risk and Understand Vulnerabilities Y Lei, JP Lanson, CA Shue, TW Wood International Conference on Detection of Intrusions and Malware, and …, 2023 | 1 | 2023 |
Towards Better Kernel and Network Monitoring of Software Actions Y Lei Worcester Polytechnic Institute,, 2020 | 1 | 2020 |
Method and apparatus for identifying a logic defect in an application C Shue, J Lanson, L Harrison, Y Lei, M Puentes US Patent App. 17/939,254, 2023 | | 2023 |