William Robertson
#185,921
Most Influential Person Now
William Robertson's AcademicInfluence.com Rankings
William Robertsoncomputer-science Degrees
Computer Science
#12042
World Rank
#12824
Historical Rank
Machine Learning
#5520
World Rank
#5594
Historical Rank
Artificial Intelligence
#5964
World Rank
#6055
Historical Rank
Database
#9110
World Rank
#9580
Historical Rank

Download Badge
Computer Science
William Robertson's Degrees
- PhD Computer Science Stanford University
Similar Degrees You Can Earn
Why Is William Robertson Influential?
(Suggest an Edit or Addition)William Robertson's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Bayesian event classification for intrusion detection (2003) (431)
- Polymorphic Worm Detection Using Structural Information of Executables (2005) (413)
- Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks (2015) (374)
- Static Disassembly of Obfuscated Binaries (2004) (336)
- A multi-model approach to the detection of web-based attacks (2005) (279)
- Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis (2012) (277)
- LAVA: Large-Scale Automated Vulnerability Addition (2016) (252)
- Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks (2013) (246)
- Automating Mimicry Attacks Using Static Binary Analysis (2005) (215)
- Testing network-based intrusion detection signatures using mutant exploits (2004) (214)
- Detecting kernel-level rootkits through binary analysis (2004) (200)
- Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks (2006) (175)
- A stateful intrusion detection system for World-Wide Web servers (2003) (158)
- Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web (2018) (127)
- TriggerScope: Towards Detecting Logic Bombs in Android Applications (2016) (126)
- Tracing Information Flows Between Ad Exchanges Using Retargeted Ads (2018) (110)
- Topology-Based Detection of Anomalous BGP Messages (2003) (109)
- Alert Verification Determining the Success of Intrusion Attempts (2004) (105)
- Run-time Detection of Heap-based Overflows (2003) (91)
- Static Enforcement of Web Application Integrity Through Strong Typing (2009) (91)
- Protecting a Moving Target: Addressing Web Application Concept Drift (2009) (81)
- Why Is CSP Failing? Trends and Challenges in CSP Adoption (2014) (72)
- An Experience in Testing the Security of Real-World Electronic Voting Systems (2010) (70)
- PatchDroid: scalable third-party security patches for Android devices (2013) (66)
- Preventing Input Validation Vulnerabilities in Web Applications through Automated Type Analysis (2012) (63)
- TRESOR-HUNT: attacking CPU-bound encryption (2012) (62)
- Exploiting Execution Context for the Detection of Anomalous System Calls (2007) (60)
- A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication (2013) (58)
- Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries (2009) (57)
- Using Alert Verification to Identify Successful Intrusion Attempts (2004) (52)
- Effective Anomaly Detection with Scarce Training Data (2010) (47)
- EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails (2016) (44)
- Surveylance: Automatically Detecting Online Survey Scams (2018) (42)
- Reverse Engineering of Network Signatures (2005) (41)
- CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes (2016) (40)
- Optical Delusions: A Study of Malicious QR Codes in the Wild (2014) (38)
- An empirical analysis of input validation mechanisms in web applications and languages (2012) (37)
- How Tracking Companies Circumvented Ad Blockers Using WebSockets (2018) (35)
- VirtualSwindle: an automated attack against in-app billing on android (2014) (35)
- Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions (2016) (34)
- Are your votes really counted?: testing the security of real-world electronic voting systems (2008) (33)
- HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing (2020) (30)
- PrivExec: Private Execution as an Operating System Service (2013) (30)
- Protecting against Ransomware: A New Line of Research or Restating Classic Ideas? (2018) (28)
- On the Effectiveness of Type-based Control Flow Integrity (2018) (28)
- Clustering and the Weekend Effect: Recommendations for the Use of Top Domain Lists in Security Research (2019) (25)
- It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains (2019) (23)
- Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers (2017) (23)
- Identifying Extension-Based Ad Injection via Fine-Grained Web Content Provenance (2016) (23)
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis (2020) (21)
- WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration (2016) (20)
- Ex-Ray: Detection of History-Leaking Browser Extensions (2017) (19)
- Speculator: a tool to analyze speculative execution attacks and mitigations (2019) (19)
- ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities (2015) (19)
- Securing Legacy Firefox Extensions with SENTINEL (2013) (17)
- Cached and Confused: Web Cache Deception in the Wild (2019) (17)
- On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users (2015) (16)
- CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities (2016) (15)
- A Longitudinal Analysis of the ads.txt Standard (2019) (14)
- SENTINEL: Securing Legacy Firefox Extensions (2015) (14)
- TrueClick: automatically distinguishing trick banners from genuine download links (2014) (14)
- Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis (2017) (12)
- Semi-automated discovery of server-based information oversharing vulnerabilities in Android applications (2017) (12)
- Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters (2013) (11)
- Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems (2016) (11)
- BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications (2015) (10)
- Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces (2014) (10)
- Let ’ s Not Speculate : Discovering and Analyzing Speculative Execution Attacks (2018) (10)
- Large-Scale Analysis of Style Injection by Relative Path Overwrite (2018) (10)
- Improving Signature Testing through Dynamic Data Flow Analysis (2007) (9)
- What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques (2020) (8)
- Bypassing memory safety mechanisms through speculative control flow hijacks (2020) (7)
- From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop (2018) (6)
- Detection of Intrusions and Malware & Vulnerability Assessment (2005) (6)
- Detecting and preventing attacks against web applications (2009) (6)
- Trellis: Privilege Separation for Multi-user Applications Made Easy (2016) (5)
- USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks (2019) (4)
- Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists (2019) (4)
- Eraser: Your Data Won't Be Back (2018) (3)
- Detection of Intrusions and Malware, and Vulnerability Assessment (2009) (3)
- Security Evaluation of the Sequoia Voting System Public Report Computer Security Group (2007) (2)
- Speculator (2019) (2)
- Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices (2016) (2)
- PyPANDA: Taming the PANDAmonium of Whole System Dynamic Analysis (2021) (2)
- Holiday Pictures or Blockbuster Movies? Copyright Infringement in User Uploads to One-Click File Hosters (2013) (1)
- HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing (2022) (0)
- Proceedings of the 7th USENIX conference on Offensive Technologies (2013) (0)
- DARKDROID: Exposing the Dark Side of Android Marketplaces (2016) (0)
- DARKDROID : EXPOSING THE DARK SIDE OF ANDROID (2016) (0)
- Proceedings of the 2016 ACM International on Workshop on Traffic Measurements for Cybersecurity (2016) (0)
- Assistant Professor (1995) (0)
- On the misuse of graphical user interface elements to implement security controls (2017) (0)
- MPKAlloc: Efficient Heap Meta-data Integrity Through Hardware Memory Protection Keys (2022) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With William Robertson?
William Robertson is affiliated with the following schools: