Biblio

Export 5 results:
Filters: Author is Clay Shields  [Clear All Filters]
2017
Vaidya T, Burger E, Sherr M, Shields C.  2017.  Where art thou, Eve? Experiences laying traps for Internet eavesdroppers 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17).
2016
Carlini N, Mishra P, Vaidya T, Zhang Y, Sherr M, Shields C, Wagner D, Zhou W.  2016.  Hidden Voice Commands. 25th USENIX Security Symposium (USENIX Security 16). :513--530.
2011
Walls RJ, Levine BNeil, Liberatore M, Shields C.  2011.  Effective Digital Forensics Research Is Investigator-Centric. 6th USENIX Workshop on Hot Topics in Security (HotSec 11).
2002
Buchholz F, Shields C.  2002.  Providing Process Origin Information to Aid in Network Traceback. 2002 USENIX Annual Technical Conference (USENIX ATC 02).