User profiles for Tim Bai
Tim BaiUniversity of Waterloo Verified email at uwaterloo.ca Cited by 200 |
A machine learning approach for RDP-based lateral movement detection
T Bai, H Bian, A Abou Daya… - 2019 IEEE 44th …, 2019 - ieeexplore.ieee.org
Detecting cyber threats has been an on-going research endeavor. In this era, advanced
persistent threats (APTs) can incur significant cost for organizations and businesses. The …
persistent threats (APTs) can incur significant cost for organizations and businesses. The …
Uncovering lateral movement using authentication logs
Network infiltrations due to advanced persistent threats (APTs) have significantly grown in
recent years. Their primary objective is to gain unauthorized access to network assets, …
recent years. Their primary objective is to gain unauthorized access to network assets, …
Rdp-based lateral movement detection using machine learning
Detecting cyber threats has been an on-going research endeavor. In this era, Advanced
Persistent Threats (APTs) can incur significant costs for organizations and businesses. The …
Persistent Threats (APTs) can incur significant costs for organizations and businesses. The …
A disaggregated packet processing architecture for network function virtualization
SR Chowdhury, H Bian, T Bai… - IEEE Journal on …, 2020 - ieeexplore.ieee.org
Network Function Virtualization (NFV) promises to reduce the capital and operational
expenditure for network operators by moving packet processing from purpose-built hardware to …
expenditure for network operators by moving packet processing from purpose-built hardware to …
Host in danger? detecting network intrusions from authentication logs
Recently, network infiltrations due to advanced persistent threats (APTs) have grown
significantly, resulting in considerable losses to businesses and organizations. APTs are stealthy …
significantly, resulting in considerable losses to businesses and organizations. APTs are stealthy …
: A Disaggregated Packet Processing Architecture
SR Chowdhury, H Bian, T Bai… - 2019 IEEE Conference …, 2019 - ieeexplore.ieee.org
Network Function Virtualization (NFV) promises to reduce the capital and operational
expenditure for network operators by moving packet processing from purpose-built hardware to …
expenditure for network operators by moving packet processing from purpose-built hardware to …
Lymphoma endothelium preferentially expresses Tim-3 and facilitates the progression of lymphoma by mediating immune evasion
X Huang, X Bai, Y Cao, J Wu, M Huang… - Journal of Experimental …, 2010 - rupress.org
… of Tim-3 was more than twofold higher in lymphoma-derived endothelium, because it has been
extensively documented that Tim-3 … We thus selected Tim-3 for further study to investigate …
extensively documented that Tim-3 … We thus selected Tim-3 for further study to investigate …
UNiS: A user-space non-intrusive workflow-aware virtual network function scheduler
Network Function Virtualization (NFV) has gained a significant research interest in both
academia and industry since its inception in the late 2012. One of the key research issues in NFV …
academia and industry since its inception in the late 2012. One of the key research issues in NFV …
IL‐6 promotes metastasis of non‐small‐cell lung cancer by up‐regulating TIM‐4 via NF‐κB
W Liu, H Wang, F Bai, L Ding, Y Huang, C Lu… - Cell …, 2020 - Wiley Online Library
Objectives Interleukin‐6 (IL‐6) is critical for the development of non‐small‐cell lung cancer (NSCLC).
Recently, we identified T‐cell immunoglobulin domain and mucin domain 4 (TIM‐4…
Recently, we identified T‐cell immunoglobulin domain and mucin domain 4 (TIM‐4…
Non-intrusive and workflow-aware virtual network function scheduling in user-space
The simple programming model and very low-overhead I/O capabilities of emerging packet
processing techniques leveraging kernel-bypass I/O and poll-mode processing is gaining …
processing techniques leveraging kernel-bypass I/O and poll-mode processing is gaining …