BibTeX records: Brad Miller

download as .bib file

@inproceedings{DBLP:conf/ccs/Biggio0MS17,
  author       = {Battista Biggio and
                  David Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {10th International Workshop on Artificial Intelligence and Security
                  (AISec 2017)},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2621--2622},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3137048},
  doi          = {10.1145/3133956.3137048},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Biggio0MS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017aisec,
  editor       = {Bhavani Thuraisingham and
                  Battista Biggio and
                  David Mandell Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  title        = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {http://dl.acm.org/citation.cfm?id=3128572},
  isbn         = {978-1-4503-5202-4},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2017aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaoKMPF16,
  author       = {Shuang Hao and
                  Alex Kantchelian and
                  Brad Miller and
                  Vern Paxson and
                  Nick Feamster},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {{PREDATOR:} Proactive Recognition and Elimination of Domain Abuse
                  at Time-Of-Registration},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1568--1579},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978317},
  doi          = {10.1145/2976749.2978317},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HaoKMPF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MillerKTABFHSWY16,
  author       = {Brad Miller and
                  Alex Kantchelian and
                  Michael Carl Tschantz and
                  Sadia Afroz and
                  Rekha Bachwani and
                  Riyaz Faizullabhoy and
                  Ling Huang and
                  Vaishaal Shankar and
                  Tony Wu and
                  George Yiu and
                  Anthony D. Joseph and
                  J. D. Tygar},
  editor       = {Juan Caballero and
                  Urko Zurutuza and
                  Ricardo J. Rodr{\'{\i}}guez},
  title        = {Reviewer Integration and Performance Measurement for Malware Detection},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 13th International Conference, {DIMVA} 2016, San Sebasti{\'{a}}n,
                  Spain, July 7-8, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9721},
  pages        = {122--141},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40667-1\_7},
  doi          = {10.1007/978-3-319-40667-1\_7},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/MillerKTABFHSWY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KantchelianTAMS15,
  author       = {Alex Kantchelian and
                  Michael Carl Tschantz and
                  Sadia Afroz and
                  Brad Miller and
                  Vaishaal Shankar and
                  Rekha Bachwani and
                  Anthony D. Joseph and
                  J. Doug Tygar},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren and
                  Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor
                  Labels},
  booktitle    = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and
                  Security, AISec 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {45--56},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808769.2808780},
  doi          = {10.1145/2808769.2808780},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KantchelianTAMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MillerKTABFHSWY15,
  author       = {Brad Miller and
                  Alex Kantchelian and
                  Michael Carl Tschantz and
                  Sadia Afroz and
                  Rekha Bachwani and
                  Riyaz Faizullabhoy and
                  Ling Huang and
                  Vaishaal Shankar and
                  Tony Wu and
                  George Yiu and
                  Anthony D. Joseph and
                  J. D. Tygar},
  title        = {Back to the Future: Malware Detection with Temporally Consistent Labels},
  journal      = {CoRR},
  volume       = {abs/1510.07338},
  year         = {2015},
  url          = {http://arxiv.org/abs/1510.07338},
  eprinttype    = {arXiv},
  eprint       = {1510.07338},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/MillerKTABFHSWY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MillerKABDHTJT14,
  author       = {Brad Miller and
                  Alex Kantchelian and
                  Sadia Afroz and
                  Rekha Bachwani and
                  Edwin Dauber and
                  Ling Huang and
                  Michael Carl Tschantz and
                  Anthony D. Joseph and
                  J. Doug Tygar},
  editor       = {Christos Dimitrakakis and
                  Aikaterini Mitrokotsa and
                  Benjamin I. P. Rubinstein and
                  Gail{-}Joon Ahn},
  title        = {Adversarial Active Learning},
  booktitle    = {Proceedings of the 2014 Workshop on Artificial Intelligent and Security
                  Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666652.2666656},
  doi          = {10.1145/2666652.2666656},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MillerKABDHTJT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/MillerHJT14,
  author       = {Brad Miller and
                  Ling Huang and
                  Anthony D. Joseph and
                  J. D. Tygar},
  editor       = {Emiliano De Cristofaro and
                  Steven J. Murdoch},
  title        = {I Know Why You Went to the Clinic: Risks and Realization of {HTTPS}
                  Traffic Analysis},
  booktitle    = {Privacy Enhancing Technologies - 14th International Symposium, {PETS}
                  2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8555},
  pages        = {143--163},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08506-7\_8},
  doi          = {10.1007/978-3-319-08506-7\_8},
  timestamp    = {Sat, 09 Apr 2022 12:39:29 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/MillerHJT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MillerHJT14,
  author       = {Brad Miller and
                  Ling Huang and
                  Anthony D. Joseph and
                  J. Doug Tygar},
  title        = {I Know Why You Went to the Clinic: Risks and Realization of {HTTPS}
                  Traffic Analysis},
  journal      = {CoRR},
  volume       = {abs/1403.0297},
  year         = {2014},
  url          = {http://arxiv.org/abs/1403.0297},
  eprinttype    = {arXiv},
  eprint       = {1403.0297},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MillerHJT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KantchelianAHIMTGJT13,
  author       = {Alex Kantchelian and
                  Sadia Afroz and
                  Ling Huang and
                  Aylin Caliskan Islam and
                  Brad Miller and
                  Michael Carl Tschantz and
                  Rachel Greenstadt and
                  Anthony D. Joseph and
                  J. D. Tygar},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Blaine Nelson and
                  Christos Dimitrakakis and
                  Elaine Shi},
  title        = {Approaches to adversarial drift},
  booktitle    = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
                  and Security, Co-located with {CCS} 2013, Berlin, Germany, November
                  4, 2013},
  pages        = {99--110},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517312.2517320},
  doi          = {10.1145/2517312.2517320},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KantchelianAHIMTGJT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MillerBT12,
  author       = {Brad Miller and
                  Kaitlyn Buck and
                  J. D. Tygar},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Systematic analysis and evaluation of web privacy policies and implementations},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {534--540},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470867/},
  timestamp    = {Thu, 10 Mar 2022 09:31:39 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/MillerBT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/MillerPGKP11,
  author       = {Brad Miller and
                  Paul Pearce and
                  Chris Grier and
                  Christian Kreibich and
                  Vern Paxson},
  editor       = {Thorsten Holz and
                  Herbert Bos},
  title        = {What's Clicking What? Techniques and Innovations of Today's Clickbots},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 8th International Conference; {DIMVA} 2011, Amsterdam, The Netherlands,
                  July 7-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6739},
  pages        = {164--183},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22424-9\_10},
  doi          = {10.1007/978-3-642-22424-9\_10},
  timestamp    = {Wed, 25 Sep 2019 18:15:55 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/MillerPGKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics