Login / Signup
Junao Wang
Publication Activity (10 Years)
Years Active: 2016-2018
Publications (10 Years): 5
Top Topics
Limited Resources
Multiple Stages
Compressed Sensing
Database
Top Venues
CoRR
USENIX Security Symposium
Comput. Chem. Eng.
</>
Publications
</>
Md Nahid Hossain
,
Sadegh M. Milajerdi
,
Junao Wang
,
Birhanu Eshete
,
Rigel Gjomemo
,
R. Sekar
,
Scott D. Stoller
,
V. N. Venkatakrishnan
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data.
CoRR
(2018)
Md Nahid Hossain
,
Junao Wang
,
R. Sekar
,
Scott D. Stoller
Dependence-Preserving Data Compaction for Scalable Forensic Analysis.
USENIX Security Symposium
(2018)
Qi Liao
,
Haoran Zhang
,
Ning Xu
,
Yongtu Liang
,
Junao Wang
A MILP model based on flowrate database for detailed scheduling of a multi-product pipeline with multiple pump stations.
Comput. Chem. Eng.
117 (2018)
Md Nahid Hossain
,
Sadegh M. Milajerdi
,
Junao Wang
,
Birhanu Eshete
,
Rigel Gjomemo
,
R. Sekar
,
Scott D. Stoller
,
V. N. Venkatakrishnan
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data.
USENIX Security Symposium
(2017)
Birhanu Eshete
,
Rigel Gjomemo
,
Md Nahid Hossain
,
Sadegh Momeni
,
R. Sekar
,
Scott D. Stoller
,
V. N. Venkatakrishnan
,
Junao Wang
Attack Analysis Results for Adversarial Engagement 1 of the DARPA Transparent Computing Program.
CoRR
(2016)