Παρακολούθηση
Muhammad Adil Inam
Muhammad Adil Inam
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα illinois.edu - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Sok: History is a vast early warning system: Auditing the provenance of system intrusions
MA Inam, Y Chen, A Goyal, J Liu, J Mink, N Michael, S Gaur, A Bates, ...
2023 IEEE Symposium on Security and Privacy (SP), 2620-2638, 2023
612023
{ALASTOR}: Reconstructing the Provenance of Serverless Intrusions
P Datta, I Polinsky, MA Inam, A Bates, W Enck
31st USENIX Security Symposium (USENIX Security 22), 2443-2460, 2022
282022
Forensic Analysis of Configuration-based Attacks
MA Inam, WU Hassan, A Ahad, A Bates, R Tahir, T Xu, F Zaffar
Proceedings of the 2022 Network and Distributed System Security Symposium, 2022
112022
FAuST: Striking a Bargain between Forensic Auditing’s Security and Throughput
MA Inam, A Goyal, J Liu, J Mink, N Michael, S Gaur, A Bates, WU Hassan
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
92022
How does Endpoint Detection use the MITRE ATT&CK Framework?
A Virkud, MA Inam, A Riddle, J Liu, G Wang, A Bates
33rd USENIX Security Symposium (USENIX Security 24), 2024
12024
Poster: How do Endpoint Detection Products Make Use of MITRE ATT&CK?
A Virkud, MA Inam, A Riddle, G Wang, A Bates
1
Carbon Filter: Real-time Alert Triage Using Large Scale Clustering and Fast Search
J Oliver, R Batta, A Bates, MA Inam, S Mehta, S Xia
arXiv preprint arXiv:2405.04691, 2024
2024
Using Behavior Monitoring to Identify Privacy Concerns in Smarthome Environments
A Almogbil, M Steele, S Belikovetsky, A Inam, O Wu, A Rubin, A Bates
NDSS Workshop on Security and Privacy in Standardized IoT (SDIoTSec), 2024
2024
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–8