Improving cybersecurity hygiene through JIT patching | 0 | 0.34 | 2020 |
Hidden In Plain Sight: Filesystem View Separation For Data Integrity And Deception | 1 | 0.41 | 2018 |
Cross-Stack Threat Sensing for Cyber Security and Resilience | 0 | 0.34 | 2018 |
Dressed up: Baiting Attackers through Endpoint Service Projection. | 1 | 0.41 | 2018 |
POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality. | 1 | 0.41 | 2017 |
Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire. | 1 | 0.36 | 2016 |
BotMeter: Charting DGA-Botnet Landscapes in Large Networks | 3 | 0.42 | 2016 |
Detecting Malicious Exploit Kits using Tree-based Similarity Searches. | 9 | 0.54 | 2016 |
Stability Visualizations As A Low-Complexity Descriptor Of Network Host Behaviour | 0 | 0.34 | 2013 |
Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing | 9 | 0.50 | 2013 |
Toward efficient querying of compressed network payloads | 5 | 0.47 | 2012 |
Cuckoo bags for exploring multikey data | 0 | 0.34 | 2010 |