Follow
Joshua C Neil
Joshua C Neil
Chief Data Scientist, Securonix
Verified email at securonix.com
Title
Cited by
Cited by
Year
Graph-based malware detection using dynamic analysis
B Anderson, D Quist, J Neil, C Storlie, T Lane
Journal in computer Virology 7, 247-258, 2011
3692011
Eliminating steganography in Internet traffic with active wardens
G Fisk, M Fisk, C Papadopoulos, J Neil
Information Hiding: 5th International Workshop, IH 2002 Noordwijkerhout, The …, 2003
2692003
Scan statistics for the online detection of locally anomalous subgraphs
J Neil, C Hash, A Brugh, M Fisk, CB Storlie
Technometrics 55 (4), 403-414, 2013
1582013
Authentication graphs: Analyzing user behavior within an enterprise network
AD Kent, LM Liebrock, JC Neil
Computers & Security 48, 150-166, 2015
922015
Anomaly detection to identify coordinated group attacks in computer networks
JC Neil, M Turcotte, NA Heard
US Patent App. 14/383,024, 2015
772015
Attack chain detection
J Sexton, C Storlie, J Neil
Statistical Analysis and Data Mining: The ASA Data Science Journal 8 (5-6 …, 2015
602015
Detecting cyber attacks using anomaly detection with explanations and expert feedback
MA Siddiqui, JW Stokes, C Seifert, E Argyle, R McCann, J Neil, J Carroll
ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019
512019
Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness
JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent
US Patent 9,560,065, 2017
512017
Connected components and credential hopping in authentication graphs
A Hagberg, N Lemons, A Kent, J Neil
2014 Tenth International Conference on Signal-Image Technology and Internet …, 2014
422014
A large-scale database for graph representation learning
S Freitas, Y Dong, J Neil, DH Chau
arXiv preprint arXiv:2011.07682, 2020
392020
Dynamic networks and cyber-security
NM Adams, NA Heard
World Scientific, 2016
352016
Using new edges for anomaly detection in computer networks
JC Neil
US Patent 9,038,180, 2015
322015
Detecting anomalous behavior via user authentication graphs
A Kent, J Neil, L Liebrock
US Patent 10,015,175, 2018
282018
Improving antivirus accuracy with hypervisor assisted analysis
D Quist, L Liebrock, J Neil
Journal in computer virology 7, 121-131, 2011
282011
Living-off-the-land command detection using active learning
T Ongun, JW Stokes, JB Or, K Tian, F Tajaddodianfar, J Neil, C Seifert, ...
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
222021
Path scanning for the detection of anomalous subgraphs and use of dns requests and host agents for anomaly/change detection and network situational awareness
JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent
US Patent App. 16/278,225, 2019
212019
Towards improved detection of attackers in computer networks: New edges, fast updating, and host agents
J Neil, B Uphoff, C Hash, C Storlie
2013 6th International Symposium on Resilient Control Systems (ISRCS), 218-224, 2013
182013
Anomaly detection in large-scale networks with latent space models
W Lee, TH McCormick, J Neil, C Sodja, Y Cui
Technometrics 64 (2), 241-252, 2022
172022
D2M: Dynamic Defense and Modeling of Adversarial Movement in Networks
S Freitas, A Wicker, DH Chau, J Neil
Proceedings of the 2020 SIAM International Conference on Data Mining, 541-549, 2020
172020
Link prediction in dynamic networks using random dot product graphs
F Sanna Passino, AS Bertiger, JC Neil, NA Heard
Data Mining and Knowledge Discovery 35 (5), 2168-2199, 2021
162021
The system can't perform the operation now. Try again later.
Articles 1–20