Managing security of virtual machine images in a cloud environment J Wei, X Zhang, G Ammons, V Bala, P Ning Proceedings of the 2009 ACM workshop on Cloud computing security, 91-96, 2009 | 384 | 2009 |
Bring your own device security issues and challenges Y Wang, J Wei, K Vangury 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), 80-85, 2014 | 133 | 2014 |
Software persistent memory J Guerra, L Marmol, D Campello, C Crespo, R Rangaswami, J Wei 2012 USENIX Annual Technical Conference (USENIX ATC 12), 319-331, 2012 | 104 | 2012 |
TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study. J Wei, C Pu FAST 5, 12-12, 2005 | 93 | 2005 |
Viaf: Verification-based integrity assurance framework for mapreduce Y Wang, J Wei 2011 IEEE 4th International Conference on Cloud Computing, 300-307, 2011 | 76 | 2011 |
Autonomous cyber deception E Al-Shaer, J Wei, W Kevin, C Wang Springer, 2019 | 48 | 2019 |
A natural language processing based trend analysis of advanced persistent threat techniques A Niakanlahiji, J Wei, BT Chu 2018 IEEE International Conference on Big Data (Big Data), 2995-3000, 2018 | 42 | 2018 |
Soft-timer driven transient kernel control flow attacks and defense J Wei, BD Payne, J Giffin, C Pu 2008 Annual Computer Security Applications Conference (ACSAC), 97-107, 2008 | 42 | 2008 |
A Methodical Defense against TOCTTOU Attacks: The EDGI Approach. C Pu, J Wei ISSSE, 2006 | 31 | 2006 |
Result integrity check for MapReduce computation on hybrid clouds Y Wang, J Wei, M Srivatsa 2013 IEEE Sixth International Conference on Cloud Computing, 847-854, 2013 | 30 | 2013 |
A secure information flow architecture for web service platforms J Wei, L Singaravelu, C Pu IEEE Transactions on Services Computing 1 (2), 75-87, 2008 | 29 | 2008 |
IntegrityMR: Integrity assurance framework for big data analytics and management applications Y Wang, J Wei, M Srivatsa, Y Duan, W Du 2013 IEEE International Conference on Big Data, 33-40, 2013 | 28 | 2013 |
Soda: A system for cyber deception orchestration and automation MSI Sajid, J Wei, B Abdeen, E Al-Shaer, MM Islam, W Diong, L Khan Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 25 | 2021 |
{ShadowMove}: A Stealthy Lateral Movement Strategy A Niakanlahiji, J Wei, MR Alam, Q Wang, BT Chu 29th USENIX Security Symposium (USENIX Security 20), 559-576, 2020 | 23 | 2020 |
Dodgetron: Towards autonomous cyber deception using dynamic hybrid analysis of malware MSI Sajid, J Wei, MR Alam, E Aghaei, E Al-Shaer 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 20 | 2020 |
The design of cyber threat hunting games: A case study MNS Miazi, MMA Pritom, M Shehab, B Chu, J Wei 2017 26th International Conference on Computer Communication and Networks …, 2017 | 18 | 2017 |
Chimera: Autonomous planning and orchestration for malware deception MM Islam, A Dutta, MSI Sajid, E Al-Shaer, J Wei, S Farhang 2021 IEEE Conference on Communications and Network Security (CNS), 173-181, 2021 | 17 | 2021 |
Toward protecting control flow confidentiality in cloud-based computation Y Wang, J Wei Computers & Security 52, 106-127, 2015 | 16 | 2015 |
Modeling the runtime integrity of cloud servers: a scoped invariant perspective J Wei, C Pu, CV Rozas, A Rajan, F Zhu Privacy and Security for Cloud Computing, 211-232, 2013 | 16 | 2013 |
Static analysis based invariant detection for commodity operating systems F Zhu, J Wei Computers & Security 43, 49-63, 2014 | 15 | 2014 |