关注
Vector Guo Li
Vector Guo Li
在 google.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Tracking ransomware end-to-end
DY Huang, MM Aliapoulios, VG Li, L Invernizzi, E Bursztein, K McRoberts, ...
2018 IEEE Symposium on Security and Privacy (SP), 618-631, 2018
2542018
Reading the tea leaves: A comparative analysis of threat intelligence
VG Li, M Dunn, P Pearce, D McCoy, GM Voelker, S Savage
28th USENIX security symposium (USENIX Security 19), 851-867, 2019
1332019
How they did it: An analysis of emission defeat devices in modern automobiles
M Contag, G Li, A Pawlowski, F Domke, K Levchenko, T Holz, S Savage
2017 IEEE Symposium on Security and Privacy (SP), 231-250, 2017
702017
Clairvoyance: Inferring blocklist use on the internet
VG Li, G Akiwate, K Levchenko, GM Voelker, S Savage
Passive and Active Measurement: 22nd International Conference, PAM 2021 …, 2021
82021
An empirical analysis on threat intelligence: Data characteristics and real-world uses
G Li
University of California, San Diego, 2020
62020
系统目前无法执行此操作,请稍后再试。
文章 1–5