Author:
Smith Randy,Estan Cristian,Jha Somesh
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation;2023 IEEE Symposium on Security and Privacy (SP);2023-05
2. Acquirer;Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security;2022-11-07
3. Optimizing Regular Expressions via Rewrite-Guided Synthesis;Proceedings of the International Conference on Parallel Architectures and Compilation Techniques;2022-10-08
4. SurgeProtector;Proceedings of the ACM SIGCOMM 2022 Conference;2022-08-22
5. A Fuzzing-Based Method for Testing Rules in Intrusion Detection Systems in 6G Networks;IEEE Network;2022-07