![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Teryl Taylor
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Mingming Chen
, Thomas La Porta
, Teryl Taylor
, Frederico Araujo
, Trent Jaeger
:
Manipulating OpenFlow Link Discovery Packet Forwarding for Topology Poisoning. CCS 2024: 3704-3718 - [c20]William Blair, Frederico Araujo, Teryl Taylor, Jiyong Jang:
Automated Synthesis of Effect Graph Policies for Microservice-Aware Stateful System Call Specialization. SP 2024: 4554-4572 - [i3]Mingming Chen, Thomas La Porta, Teryl Taylor, Frederico Araujo, Trent Jaeger:
Manipulating OpenFlow Link Discovery Packet Forwarding for Topology Poisoning. CoRR abs/2408.16940 (2024) - 2023
- [c19]Xu Lin, Frederico Araujo, Teryl Taylor, Jiyong Jang, Jason Polakis:
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses. SP 2023: 987-1004 - 2022
- [c18]Adam Duby, Teryl Taylor, Yanyan Zhuang:
Malware Family Classification via Residual Prefetch Artifacts. CCNC 2022: 256-259 - [c17]Adam Duby, Teryl Taylor, Gedare Bloom, Yanyan Zhuang:
Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files. CCWC 2022: 745-751 - [c16]Adam Duby, Teryl Taylor, Gedare Bloom, Yanyan Zhuang:
Evaluating Feature Robustness for Windows Malware Family Classification. ICCCN 2022: 1-10 - 2021
- [i2]Teryl Taylor, Frederico Araujo, Xiaokui Shu:
Towards an Open Format for Scalable System Telemetry. CoRR abs/2101.10474 (2021) - [i1]Frederico Araujo, Dhilung Kirat, Xiaokui Shu, Teryl Taylor, Jiyong Jang:
Evidential Cyber Threat Hunting. CoRR abs/2104.10319 (2021) - 2020
- [c15]Teryl Taylor, Frederico Araujo, Xiaokui Shu:
Towards an Open Format for Scalable System Telemetry. IEEE BigData 2020: 1031-1040 - [c14]Frederico Araujo, Teryl Taylor:
Improving cybersecurity hygiene through JIT patching. ESEC/SIGSOFT FSE 2020: 1421-1432
2010 – 2019
- 2018
- [c13]Marc Ph. Stoecklin, Jialong Zhang, Frederico Araujo, Teryl Taylor:
Dressed up: Baiting Attackers through Endpoint Service Projection. SDN-NFV@CODASPY 2018: 23-28 - [c12]Teryl Taylor, Frederico Araujo, Anne Kohlbrenner, Marc Ph. Stoecklin:
Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception. DIMVA 2018: 256-278 - [c11]Frederico Araujo, Teryl Taylor, Jialong Zhang, Marc Ph. Stoecklin:
Cross-Stack Threat Sensing for Cyber Security and Resilience. DSN Workshops 2018: 18-21 - 2017
- [c10]Anne Kohlbrenner, Frederico Araujo, Teryl Taylor, Marc Ph. Stoecklin:
POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality. CCS 2017: 2523-2525 - 2016
- [b1]Teryl Taylor:
Using Context to Improve Network-based Exploit Kit Detection. University of North Carolina, Chapel Hill, USA, 2016 - [c9]Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose, Reiner Sailer:
Detecting Malicious Exploit Kits using Tree-based Similarity Searches. CODASPY 2016: 255-266 - [c8]Ting Wang, Xin Hu, Jiyong Jang, Shouling Ji, Marc Ph. Stoecklin, Teryl Taylor:
BotMeter: Charting DGA-Botnet Landscapes in Large Networks. ICDCS 2016: 334-343 - [c7]Teryl Taylor, Kevin Z. Snow, Nathan Otterness, Fabian Monrose:
Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire. NDSS 2016 - 2013
- [c6]Matt MacDonald, Carrie Gates, Teryl Taylor, Diana Paterson, Stephen Brooks:
Stability Visualizations as a Low-complexity Descriptor of Network Host Behaviour. ANT/SEIT 2013: 984-991 - [c5]Srinivas Krishnan, Teryl Taylor, Fabian Monrose, John McHugh:
Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing. DSN 2013: 1-12 - 2012
- [c4]Teryl Taylor, Scott E. Coull, Fabian Monrose, John McHugh:
Toward Efficient Querying of Compressed Network Payloads. USENIX ATC 2012: 113-124 - 2010
- [c3]John McHugh, Teryl Taylor, Jeff Janies:
Cuckoo bags for exploring multikey data. CSIIRW 2010: 18
2000 – 2009
- 2009
- [c2]Joel Glanfield, Stephen Brooks, Teryl Taylor, Diana Paterson, Christopher Smith, Carrie Gates, John McHugh:
Over flow: An overview visualization for network analysis. VizSEC 2009: 11-19 - 2007
- [c1]Teryl Taylor, Stephen Brooks, John McHugh:
NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior. VizSEC 2007: 101-114
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint