Year |
Citation |
Score |
2014 |
Audzevich Y, Watts PM, West A, Mujumdar A, Moore SW, Moore AW. Power optimized transceivers for future switched networks Ieee Transactions On Very Large Scale Integration (Vlsi) Systems. 22: 2081-2092. DOI: 10.1109/TVLSI.2013.2283300 |
1 |
|
2014 |
West AG, Aviv AJ. Measuring privacy disclosures in URL query strings Ieee Internet Computing. 18: 52-59. DOI: 10.1109/MIC.2014.104 |
1 |
|
2014 |
Mohaisen A, West AG, Mankin A, Alrawi O. Chatter: Classifying malware families using system event ordering 2014 Ieee Conference On Communications and Network Security, Cns 2014. 283-291. DOI: 10.1109/CNS.2014.6997496 |
1 |
|
2014 |
West AG, Mohaisen A. Metadata-driven threat classification of network endpoints appearing in malware Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8550: 152-171. DOI: 10.1007/978-3-319-08509-8_9 |
1 |
|
2013 |
Chang J, Venkatasubramanian KK, West AG, Lee I. Analyzing and defending against web-based malware Acm Computing Surveys. 45. DOI: 10.1145/2501654.2501663 |
1 |
|
2013 |
Chang J, Venkatasubramanian KK, West AG, Kannan S, Lee I, Loo BT, Sokolsky O. AS-CRED: Reputation and alert service for interdomain routing Ieee Systems Journal. 7: 396-409. DOI: 10.1109/JSYST.2012.2221856 |
1 |
|
2013 |
Mohaisen A, Alrawi O, West AG, Mankin A. Babble: Identifying malware by its dialects 2013 Ieee Conference On Communications and Network Security, Cns 2013. 407-408. DOI: 10.1109/CNS.2013.6682751 |
1 |
|
2013 |
Kosba AE, Mohaisen A, West AG, Tonn T. ADAM: Automated detection and attribution of malicious webpages 2013 Ieee Conference On Communications and Network Security, Cns 2013. 399-400. DOI: 10.1109/CNS.2013.6682747 |
1 |
|
2013 |
Audzevich Y, Watts PM, West A, Mujumdar A, Crowcroft J, Moore AW. Low power optical transceivers for switched interconnect networks International Conference On Advanced Technologies For Communications. 301-306. DOI: 10.1109/ATC.2013.6698126 |
1 |
|
2012 |
West AG, Lee I. Towards content-driven reputation for collaborative code repositories Wikisym 2012 Conference Proceedings - 8th Annual International Symposium On Wikis and Open Collaboration. DOI: 10.1145/2462932.2462950 |
1 |
|
2012 |
West AG, Chang J, Venkatasubramanian KK, Lee I. Trust in collaborative web applications Future Generation Computer Systems. 28: 1238-1251. DOI: 10.1016/j.future.2011.02.007 |
1 |
|
2012 |
West AG, Hayati P, Potdar V, Lee I. Spamming for science: Active measurement in web 2.0 abuse research Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7398: 98-111. DOI: 10.1007/978-3-642-34638-5_9 |
1 |
|
2011 |
Chang J, Venkatasubramanian K, West AG, Kannan S, Sokolsky O, Kim MJ, Lee I. ToMaTo: A trustworthy code mashup development tool Acm International Conference Proceeding Series. DOI: 10.1145/2076006.2076012 |
1 |
|
2011 |
West AG, Agrawal A, Baker P, Exline B, Lee I. Autonomous link spam detection in purely collaborative environments Wikisym 2011 Conference Proceedings - 7th Annual International Symposium On Wikis and Open Collaboration. 91-100. DOI: 10.1145/2038558.2038574 |
1 |
|
2011 |
West AG, Lee I. What Wikipedia deletes: Characterizing dangerous collaborative content Wikisym 2011 Conference Proceedings - 7th Annual International Symposium On Wikis and Open Collaboration. 25-28. DOI: 10.1145/2038558.2038563 |
1 |
|
2011 |
West AG, Chang J, Venkatasubramanian K, Sokolsky O, Lee I. Link spamming wikipedia for profit Acm International Conference Proceeding Series. 152-161. DOI: 10.1145/2030376.2030394 |
1 |
|
2011 |
West AG, Lee I. Towards the effective temporal association mining of spam blacklists Acm International Conference Proceeding Series. 73-82. DOI: 10.1145/2030376.2030385 |
1 |
|
2011 |
Chang J, Venkatasubramanian KK, West AG, Kannan S, Loo BT, Sokolsky O, Lee I. AS-TRUST: A trust quantification scheme for autonomous systems in BGP Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6740: 262-276. DOI: 10.1007/978-3-642-21599-5-20 |
1 |
|
2011 |
Adler BT, De Alfaro L, Mola-Velasco SM, Rosso P, West AG. Wikipedia vandalism detection: Combining natural language, metadata, and reputation features Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6609: 277-288. DOI: 10.1007/978-3-642-19437-5_23 |
1 |
|
2011 |
West AG, Lee I. Multilingual vandalism detection using language-independent & ex post facto evidence notebook for PAN at CLEF 2011 Ceur Workshop Proceedings. 1177. |
1 |
|
2010 |
West AG, Kannan S, Lee I, Sokolsky O. An evaluation framework for reputation management systems Trust Modeling and Management in Digital Environments: From Social Concept to System Development. 282-308. DOI: 10.4018/978-1-61520-682-7.ch012 |
1 |
|
2010 |
West AG, Aviv AJ, Chang J, Lee I. Spam mitigation using spatio-temporal reputations from blacklist history Proceedings - Annual Computer Security Applications Conference, Acsac. 161-170. DOI: 10.1145/1920261.1920287 |
1 |
|
2010 |
West AG, Kannan S, Lee I. STiki: An anti-vandalism tool for wikipedia using spatio-temporal analysis of revision metadata Proceedings of Wikisym 2010 - the 6th International Symposium On Wikis and Open Collaboration. DOI: 10.1145/1832772.1832814 |
1 |
|
2010 |
West AG, Kannan S, Lee I. Spatio-temporal analysis of wikipedia metadata and the STiki anti-vandalism tool Proceedings of Wikisym 2010 - the 6th International Symposium On Wikis and Open Collaboration. DOI: 10.1145/1832772.1832797 |
1 |
|
2010 |
West AG, Kannan S, Lee I. Detecting Wikipedia vandalism via spatio-temporal analysis of revision metadata? Proceedings of the 3rd European Workshop On System Security, Eurosec'10. 22-28. DOI: 10.1145/1752046.1752050 |
1 |
|
2010 |
Brodt W, Bruner C, Englert H, Lhuillier P, Rian K, West A. Communication between substation with 61850 technology and control centre 43rd International Conference On Large High Voltage Electric Systems 2010, Cigre 2010. |
1 |
|
2009 |
West AG, Aviv AJ, Chang J, Prabhu VS, Blaze M, Kannan S, Lee I, Smith JM, Sokolsky O. QuanTM: A Quantitative Trust Management system Proceedings of the 2nd European Workshop On System Security, Eurosec'09. 28-35. DOI: 10.1145/1519144.1519149 |
1 |
|
2007 |
Coast J, West A. The practical application of the wits protocol: Supplier perspective 2 Iet Seminar Digest. 2007: 19-26. DOI: 10.1049/ic:20070558 |
1 |
|
2006 |
Mullins R, West A, Moore S. The design and implementation of a low-latency on-chip network Proceedings of the Asia and South Pacific Design Automation Conference, Asp-Dac. 2006: 164-169. |
1 |
|
2005 |
Roberts GF, Penty RV, White IH, West A, Moore S. Multi-wavelength data encoding for improved input power dynamic range in semiconductor optical amplifier switches Conference Proceedings - Lasers and Electro-Optics Society Annual Meeting-Leos. 2005: 739-740. DOI: 10.1109/LEOS.2005.1548219 |
1 |
|
2004 |
Mullins R, West A, Moore S. Low-latency virtual-channel routers for on-chip networks Conference Proceedings - Annual International Symposium On Computer Architecture, Isca. 31: 188-197. |
1 |
|
Show low-probability matches. |