Enforcing customizable consistency properties in {Software-Defined} networks W Zhou, D Jin, J Croft, M Caesar, PB Godfrey 12th usenix symposium on networked systems design and implementation (nsdi …, 2015 | 109 | 2015 |
An Empirical Security Study of the Native Code in the JDK. G Tan, J Croft Usenix Security Symposium, 365-378, 2008 | 105 | 2008 |
Ravel: A database-defined network A Wang, X Mei, J Croft, M Caesar, B Godfrey Proceedings of the Symposium on SDN Research, 1-7, 2016 | 58 | 2016 |
Towards Practical Avoidance of Information Leakage in Enterprise Networks J Croft, M Caesar | 29* | |
Systematically exploring the behavior of control programs J Croft, R Mahajan, M Caesar, M Musuvathi 2015 USENIX Annual Technical Conference (USENIX ATC 15), 165-176, 2015 | 21 | 2015 |
Neat: Network error auto-correct W Zhou, J Croft, B Liu, M Caesar Proceedings of the Symposium on SDN Research, 157-163, 2017 | 10 | 2017 |
Automatically Correcting Networks with {NEAt} W Zhou, J Croft, B Liu, E Ang, M Caesar 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2018 | 9 | 2018 |
Reflections on Data Integration for SDN A Wang, J Croft, E Dragut Proceedings of the ACM International Workshop on Security in Software …, 2017 | 3 | 2017 |
Back to the future: Forecasting program behavior in automated homes J Croft, R Mahajan, M Caesar, M Musuvathi Microsoft, 2012 | 3 | 2012 |
Automating SDN Composition: A Database Perspective A Wang, J Croft Proceedings of the Symposium on SDN Research, 203-204, 2017 | 2 | 2017 |
Secure distribution of confidential information via self-destructing data J Croft, R Signorile Proceedings of the 8th World Scientific and Engineering Academy and Society …, 2009 | 2 | 2009 |
A self-destructing file distribution system with feedback for peer-to-peer networks J Croft, R Signorile Pro-ceedings of the 9th WSEAS international conference on Applied computer …, 2009 | 2 | 2009 |
Toward predictable control of software-defined networks J Croft University of Illinois at Urbana-Champaign, 2017 | | 2017 |
Modeling and predicting control system behavior through fast-forwarding J Croft, R Mahajan, M Musuvathi US Patent App. 13/325,077, 2013 | | 2013 |
Security Analysis of the Native Code in Sun’s JDK J Croft, G Tan | | |