Articles with public access mandates - Clay ShieldsLearn more
Available somewhere: 5
Hidden voice commands
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
25th USENIX security symposium (USENIX security 16), 513-530, 2016
Mandates: US National Science Foundation
Dispersing asymmetric DDoS attacks with SplitStack
A Chen, A Sriraman, T Vaidya, Y Zhang, A Haeberlen, BT Loo, LTX Phan, ...
Proceedings of the 15th ACM Workshop on Hot Topics in Networks, 197-203, 2016
Mandates: US National Science Foundation
Dedos: Defusing dos with dispersion oriented software
HM Demoulin, T Vaidya, I Pedisich, B DiMaiolo, J Qian, C Shah, Y Zhang, ...
Proceedings of the 34th Annual Computer Security Applications ConferenceĀ ā€¦, 2018
Mandates: US National Science Foundation, US Department of Defense
A demonstration of the dedos platform for defusing asymmetric ddos attacks in data centers
HM Demoulin, T Vaidya, I Pedisich, N Sultana, B Wang, J Qian, Y Zhang, ...
Proceedings of the SIGCOMM Posters and Demos, 71-73, 2017
Mandates: US National Science Foundation, US Department of Defense
Where art thou, Eve? Experiences laying traps for Internet eavesdroppers
T Vaidya, E Burger, M Sherr, C Shields
10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17), 2017
Mandates: US National Science Foundation
Publication and funding information is determined automatically by a computer program