Cited By
View all- Wang ZZhu SMan KZhu PHao YQian ZKrishnamurthy SLa Porta TDe Lucia MKim YKim JVigna GShi E(2021)Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model ComparisonProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484762(3384-3399)Online publication date: 12-Nov-2021
- Liu XWang SWang PWu DBeecham SDamian D(2019)Automatic grading of programming assignmentsProceedings of the 41st International Conference on Software Engineering: Software Engineering Education and Training10.1109/ICSE-SEET.2019.00022(126-137)Online publication date: 27-May-2019
- Vetterl AClayton RRossow CYounan Y(2018)Bitter harvestProceedings of the 12th USENIX Conference on Offensive Technologies10.5555/3307423.3307432(9-9)Online publication date: 13-Aug-2018
- Show More Cited By