Lightweight authentication of freshness in outsourced key-value storesYuzhe TangTing Wanget al.2014ACSAC 2014
Asset risk scoring in enterprise network with mutually reinforced reputation propagationXin HuTing Wanget al.2014S&P 2014
Stream computing for large-scale, multi-channel cyber threat analyticsDouglas L. SchalesMihai Christodorescuet al.2014IRI 2014