Export 5 results:
Filters: Author is Clay Shields  [Clear All Filters]
Vaidya T, Burger E, Sherr M, Shields C.  2017.  Where art thou, Eve? Experiences laying traps for Internet eavesdroppers 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17).
Carlini N, Mishra P, Vaidya T, Zhang Y, Sherr M, Shields C, Wagner D, Zhou W.  2016.  Hidden Voice Commands. 25th USENIX Security Symposium (USENIX Security 16). :513--530.
Walls RJ, Levine BNeil, Liberatore M, Shields C.  2011.  Effective Digital Forensics Research Is Investigator-Centric. 6th USENIX Workshop on Hot Topics in Security (HotSec 11).
Buchholz F, Shields C.  2002.  Providing Process Origin Information to Aid in Network Traceback. 2002 USENIX Annual Technical Conference (USENIX ATC 02).