Old Web
English
Sign In
Acemap
>
authorDetail
>
Junao Wang
Junao Wang
Stony Brook University
Computer science
Computer security
Audit
Scalability
Dependency graph
7
Papers
106
Citations
0.00
KQI
Citation Trend
Filter By
Interval:
1900~2024
1900
2024
Author
Papers (5)
Sort By
Default
Most Recent
Most Early
Most Citation
No data
Journal
Conference
Others
Dependence-Preserving Data Compaction for Scalable Forensic Analysis
2018
SECURITY | USENIX Security Symposium
Md. Nahid Hossain
Junao Wang
R. Sekar
Scott D. Stoller
Show All
Source
Cite
Save
Citations (0)
{SLEUTH}: Real-time Attack Scenario Reconstruction from {COTS} Audit Data
2017
SECURITY | USENIX Security Symposium
Md. Nahid Hossain
Sadegh M. Milajerdi
Junao Wang
Birhanu Eshete
Rigel Gjomemo
R. Sekar
Scott Stoller
V. N. Venkatakrishnan
Show All
Source
Cite
Save
Citations (0)
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data.
2017
SECURITY | USENIX Security Symposium
Nahid Hossain
Sadegh M. Milajerdi
Junao Wang
Birhanu Eshete
Rigel Gjomemo
R. Sekar
Scott D. Stoller
V. N. Venkatakrishnan
Show All
Source
Cite
Save
Citations (15)
Attack Analysis Results for Adversarial Engagement 1 of the DARPA Transparent Computing Program.
2016
arXiv: Cryptography and Security
Birhanu Eshete
Rigel Gjomemo
Nahid Hossain
Sadegh Momeni
R. Sekar
Scott D. Stoller
V. N. Venkatakrishnan
Junao Wang
Show All
Source
Cite
Save
Citations (7)
Time resolved x-ray measurements of diesel sprays at elevated ambient pressure.
2005
Essam El-Hannouny
Sreenath Borra Gupta
Christopher F. Powell
Seong-Kyun Cheong
Ramanujam R. Sekar
Junao Wang
Show All
Source
Cite
Save
Citations (1)
1