Flovis: Flow visualization system T Taylor, D Paterson, J Glanfield, C Gates, S Brooks, J McHugh 2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009 | 87 | 2009 |
Methods, systems, and computer readable media for detecting malicious network traffic TP Taylor, KZ Snow, NM Otterness, FN Monrose US Patent 9,992,217, 2018 | 74 | 2018 |
Detecting web exploit kits by tree-based structural similarity search X Hu, J Jang, F Monrose, MP Stoecklin, T Taylor, T Wang US Patent 9,723,016, 2017 | 58 | 2017 |
Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing S Krishnan, T Taylor, F Monrose, J McHugh 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013 | 47 | 2013 |
Detecting malicious exploit kits using tree-based similarity searches T Taylor, X Hu, T Wang, J Jang, MP Stoecklin, F Monrose, R Sailer proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016 | 43 | 2016 |
NetBytes viewer: An entity-based netflow visualization utility for identifying intrusive behavior T Taylor, S Brooks, J McHugh VizSEC 2007: Proceedings of the Workshop on Visualization for Computer …, 2008 | 41 | 2008 |
Filesystem view separation for data confidentiality and integrity using lattice-based security domains F Araujo, MP Stoecklin, TP Taylor US Patent 11,562,086, 2023 | 38 | 2023 |
Over flow: An overview visualization for network analysis J Glanfield, S Brooks, T Taylor, D Paterson, C Smith, C Gates, J McHugh 2009 6th International Workshop on Visualization for Cyber Security, 11-19, 2009 | 31 | 2009 |
Defending against model inversion attacks on neural networks F Araujo, J Zhang, T Taylor, MP Stoecklin US Patent 10,733,292, 2020 | 30 | 2020 |
Cyber-deception using network port projection F Araujo, DL Schales, MP Stoecklin, TP Taylor US Patent 10,979,453, 2021 | 26 | 2021 |
BotMeter: Charting DGA-botnet landscapes in large networks T Wang, X Hu, J Jang, S Ji, M Stoecklin, T Taylor 2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016 | 26 | 2016 |
Methods, systems, and computer readable media for detecting a compromised computing host F Monrose, T Taylor, S Krishnan, J McHugh US Patent 9,934,379, 2018 | 25 | 2018 |
Intrusion detection in micro-services through container telemetry and behavior modeling F Araujo, TP Taylor, J Jang, W Blair US Patent 11,748,473, 2023 | 22 | 2023 |
Improving cybersecurity hygiene through JIT patching F Araujo, T Taylor Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020 | 22 | 2020 |
Detecting adversarial attacks through decoy training J Zhang, F Araujo, T Taylor, MP Stoecklin US Patent 11,501,156, 2022 | 21 | 2022 |
Identification and extraction of key forensics indicators of compromise using subject-specific filesystem views F Araujo, AE Kohlbrenner, MP Stoecklin, TP Taylor US Patent 11,775,638, 2023 | 20 | 2023 |
Application-level sandboxing F Araujo, DL Schales, MP Stoecklin, TP Taylor US Patent 10,887,346, 2021 | 19 | 2021 |
On-demand injection of software booby traps in live processes F Araujo, DL Schales, MP Stoecklin, TP Taylor US Patent 10,498,763, 2019 | 19 | 2019 |
Detecting web exploit kits by tree-based structural similarity search X Hu, J Jang, F Monrose, MP Stoecklin, T Taylor, T Wang US Patent 9,516,051, 2016 | 19 | 2016 |
Automated synthesis of reference policies for runtime microservice protection F Araujo, W Blair, TP Taylor US Patent App. 17/390,881, 2023 | 17 | 2023 |