Paper-Conference

Secure IP Address Allocation at Cloud Scale
Characterizing the Modification Space of Signature IDS Rules
The Space of Adversarial Strategies
Building a Privacy-Preserving Smart Camera System
On the Robustness of Domain Constraints