A survey of botnet technology and defenses M Bailey, E Cooke, F Jahanian, Y Xu, M Karir 2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009 | 358 | 2009 |
An exploration of L2 cache covert channels in virtualized environments Y Xu, M Bailey, F Jahanian, K Joshi, M Hiltunen, R Schlichting Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 29-40, 2011 | 341 | 2011 |
Bobtail: Avoiding Long Tails in the Cloud Y Xu, Z Musgrave, B Noble, M Bailey Proceedings of the 10th USENIX conference on Networked Systems Design and …, 2013 | 306 | 2013 |
Small is Better: Avoiding Latency Traps in Virtualized Data Centers Y Xu, M Bailey, B Noble, F Jahanian Proceedings of the 2013 ACM Symposium on Cloud Computing, 2013 | 78 | 2013 |
Workload-aware provisioning in public clouds Y Xu, Z Musgrave, B Noble, M Bailey IEEE internet computing 18 (4), 15-21, 2014 | 27 | 2014 |
CANVuS: Context-aware network vulnerability scanning Y Xu, M Bailey, E Vander Weele, F Jahanian Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010 | 12 | 2010 |