Blockchain-based automated and robust cyber security management | 0 | 0.34 | 2022 |
Auditing a Software-Defined Cross Domain Solution Architecture | 0 | 0.34 | 2022 |
A New Method for Inferring Ground-Truth Labels and Malware Detector Effectiveness Metrics. | 0 | 0.34 | 2021 |
ExHPD: Exploiting Human, Physical, and Driving Behaviors to Detect Vehicle Cyber Attacks | 0 | 0.34 | 2021 |
Computational complexity characterization of protecting elections from bribery | 0 | 0.34 | 2021 |
Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching | 0 | 0.34 | 2021 |
Hardness and Algorithms for Electoral Manipulation Under Media Influence | 0 | 0.34 | 2021 |
Cyber-guided Deep Neural Network for Malicious Repository Detection in GitHub | 0 | 0.34 | 2020 |
APIN: Automatic Attack Path Identification in Computer Networks | 0 | 0.34 | 2020 |
Data-Driven Characterization and Detection of COVID-19 Themed Malicious Websites | 0 | 0.34 | 2020 |
Metrics Towards Measuring Cyber Agility | 5 | 0.45 | 2019 |
A Case Study on using Deep Learning for Network Intrusion Detection | 0 | 0.34 | 2019 |
Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study | 0 | 0.34 | 2019 |
A deep learning framework for predicting cyber attacks rates. | 2 | 0.41 | 2019 |
Unified Preventive and Reactive Cyber Defense Dynamics Is Still Globally Convergent | 1 | 0.35 | 2019 |
iDev - Enhancing Social Coding Security by Cross-platform User Identification Between GitHub and Stack Overflow. | 3 | 0.37 | 2019 |
Election with Bribe-Effect Uncertainty - A Dichotomy Result. | 0 | 0.34 | 2019 |
Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment. | 0 | 0.34 | 2018 |
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. | 54 | 1.56 | 2018 |
Enhancing Robustness of Deep Neural Networks Against Adversarial Malware Samples: Principles, Framework, and AICS'2019 Challenge. | 0 | 0.34 | 2018 |
Node Diversification in Complex Networks by Decentralized Coloring. | 0 | 0.34 | 2018 |
HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples. | 1 | 0.35 | 2018 |
Quantifying the security effectiveness of firewalls and DMZs. | 0 | 0.34 | 2018 |
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities | 5 | 0.42 | 2018 |
Efficient Public Blockchain Client for Lightweight Users. | 0 | 0.34 | 2018 |
DroidEye: Fortifying Security of Learning-Based Classifier Against Adversarial Android Malware Attacks. | 0 | 0.34 | 2018 |
Preventive and Reactive Cyber Defense Dynamics Is Globally Stable. | 8 | 0.47 | 2018 |
Multi-context features for detecting malicious programs. | 3 | 0.40 | 2018 |
A safety and security architecture for reducing accidents in intelligent transportation systems | 0 | 0.34 | 2018 |
Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth. | 7 | 0.44 | 2018 |
Measuring Relative Accuracy Of Malware Detectors In The Absence Of Ground Truth | 0 | 0.34 | 2018 |
Characterizing The Effectiveness Of Network-Based Intrusion Detection Systems | 0 | 0.34 | 2018 |
Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm | 0 | 0.34 | 2018 |
RollSec: Automatically Secure Software States Against General Rollback. | 1 | 0.35 | 2018 |
Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization. | 5 | 0.43 | 2017 |
A control flow graph-based signature for packer identification. | 0 | 0.34 | 2017 |
EPBC: Efficient Public Blockchain Client for lightweight users. | 0 | 0.34 | 2017 |
A Survey on Security Metrics. | 0 | 0.34 | 2016 |
Extracting attack narratives from traffic datasets | 0 | 0.34 | 2016 |
VulPecker: an automated vulnerability detection system based on code similarity analysis. | 24 | 0.78 | 2016 |
Spatiotemporal Patterns And Predictability Of Cyberattacks | 6 | 0.46 | 2016 |
Active cyber defense dynamics exhibiting rich phenomena | 9 | 0.57 | 2015 |
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data. | 12 | 0.52 | 2015 |
A Characterization of Cybersecurity Posture from Network Telescope Data. | 11 | 0.47 | 2014 |
Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy | 1 | 0.35 | 2014 |
Characterizing the power of moving target defense via cyber epidemic dynamics | 7 | 0.51 | 2014 |
A new approach to modeling and analyzing security of networked systems | 6 | 0.44 | 2014 |
Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study | 25 | 0.91 | 2013 |
Cross-layer detection of malicious websites | 34 | 0.95 | 2013 |
Real-time detection and prevention of android SMS permission abuses | 5 | 0.42 | 2013 |