Michael E. Locasto, Ph.D.

Affiliations: 
2008 Columbia University, New York, NY 
Area:
Computer Science
Google:
"Michael Locasto"

Parents

Sign in to add mentor
Angelos D. Keromytis grad student 2008 Columbia
 (Integrity postures for software self -defense.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Boyd SW, Kc GS, Locasto ME, et al. (2010) On the general applicability of instruction-set randomization Ieee Transactions On Dependable and Secure Computing. 7: 255-270
Song Y, Locasto ME, Stavrou A, et al. (2010) On the infeasibility of modeling polymorphic shellcode : Re-thinking the role of learning in intrusion detection systems Machine Learning. 81: 179-205
Cretu GF, Stavrou A, Locasto ME, et al. (2008) Casting out demons: Sanitizing training data for anomaly sensors Proceedings - Ieee Symposium On Security and Privacy. 81-95
Locasto ME, Burnside M, Keromytis AD. (2008) Online network forensics for automatic repair validation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5312: 136-151
Locasto ME, Stavrou A, Cretu GF, et al. (2008) Return value predictability profiles for self-healing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5312: 152-166
Stavrou A, Locasto ME, Keromytis AD. (2008) Pushback for overlay networks: Protecting against malicious insiders Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5037: 39-54
Locasto ME, Stavrou A, Keromytis AD. (2007) Dark application communities Proceedings New Security Paradigms Workshop. 11-18
Aviv AJ, Locasto ME, Potter S, et al. (2007) SSARES: Secure Searchable Automated Remote Email Storage Proceedings - Annual Computer Security Applications Conference, Acsac. 129-138
Locasto ME, Wang K, Keromytis AD, et al. (2006) FLIPS: Hybrid adaptive intrusion prevention Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3858: 82-101
Benny W, Locasto ME, Keromytis AD. (2006) PalProtect: A collaborative security approach to comment spam Proceedings of the 2006 Ieee Workshop On Information Assurance. 2006: 170-175
See more...