King's College London

Research portal

Research Outputs

  1. 2015
  2. Conformal Clustering and Its Application to Botnet Traffic

    Cherubin, G., Nouretdinov, I., Gammerman, A., Jordaney, R., Wang, Z., Papini, D. & Cavallaro, L., 3 Apr 2015, In : Statistical Learning and Data Sciences. 9047, p. 313-322

    Research output: Contribution to journalConference paper

  3. CopperDroid: Automatic Reconstruction of Android Malware Behaviors

    Tam, K., Fattori, A., Khan, S. & Cavallaro, L., 7 Feb 2015, In : NDSS Symposium 2015.

    Research output: Contribution to journalConference paper

  4. 2013
  5. Practical Automated Vulnerability Monitoring Using Program State Invariants

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 23 Jun 2013, In : IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '13).

    Research output: Contribution to journalConference paper

  6. 2012
  7. When Hardware Meets Software: a Bulletproof Solution to Forensic Memory Acquisition

    Reina, A., Fattori, A., Pagani, F., Cavallaro, L. & Bruschi, D., 1 Dec 2012, In : Annual Computer Security Application Conference (ACSAC).

    Research output: Contribution to journalConference paper

  8. 2011
  9. Sandnet: Network Traffic Analysis of Malicious Software

    Rossow, C., Dietrich, C. J., Bos, H., Cavallaro, L., Steen, M. V., Freiling, F. C. & Pohlmann, N., 1 Apr 2011, In : 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).

    Research output: Contribution to journalConference paper

  10. Taint-Enhanced Anomaly Detection

    Cavallaro, L. & Sekar, R., 2011, In : ICISS. p. 160-174 15 p.

    Research output: Contribution to journalConference paper

  11. 2009
  12. Your Botnet is My Botnet: Analysis of a Botnet Takeover

    Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C. & Vigna, G., 1 Nov 2009, In : CCS '09 Proceedings of the 16th ACM conference on Computer and communications security. p. 635-647 13 p.

    Research output: Contribution to journalConference paper

  13. 2008
  14. A Parallel Architecture for Stateful, High-Speed Intrusion Detection

    Foschini, L., Thapliyal, A. V., Cavallaro, L., Kruegel, C. & Vigna, G., 2008, In : 4th International Conference on Information Systems Security (ICISS).

    Research output: Contribution to journalConference paper

  15. 2005
  16. Replay Attack in TCG Specification and Solution

    Bruschi, D., Cavallaro, L., [Unknown], L., Meiser, A. & Monga, M., 2005, In : 21th Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, Arizona, USA.

    Research output: Contribution to journalConference paper

  17. 2000
  18. Neuropsychological functioning in first-episode psychosis - evidence of specific deficits

    Riley, E. M., McGovern, D., Mockler, D., Doku, V. C. K., OCeallaigh, S., Fannon, D. G., Tennakoon, L., Santamaria, M., Soni, W., Morris, R. G. & Sharma, T., 25 May 2000, In : Schizophrenia Research. 43, 1, p. 47 - 55 9 p.

    Research output: Contribution to journalConference paper

Export:RIS BibTex Word PDF - will at most contain 500 items

Refine results Clear filters

Language

Language

Publication year

Full text

Full text

Meeting and poster abstracts

© 2018 King's College London | Strand | London WC2R 2LS | England | United Kingdom | Tel +44 (0)20 7836 5454