Flovis: Flow visualization system T Taylor, D Paterson, J Glanfield, C Gates, S Brooks, J McHugh 2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009 | 85 | 2009 |
Methods, systems, and computer readable media for detecting malicious network traffic TP Taylor, KZ Snow, NM Otterness, FN Monrose US Patent 9,992,217, 2018 | 45 | 2018 |
Detecting malicious exploit kits using tree-based similarity searches T Taylor, X Hu, T Wang, J Jang, MP Stoecklin, F Monrose, R Sailer proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016 | 42 | 2016 |
Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing S Krishnan, T Taylor, F Monrose, J McHugh 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013 | 42 | 2013 |
Detecting web exploit kits by tree-based structural similarity search X Hu, J Jang, F Monrose, MP Stoecklin, T Taylor, T Wang US Patent 9,723,016, 2017 | 41 | 2017 |
NetBytes viewer: An entity-based netflow visualization utility for identifying intrusive behavior T Taylor, S Brooks, J McHugh VizSEC 2007: Proceedings of the Workshop on Visualization for Computer …, 2008 | 37 | 2008 |
Over flow: An overview visualization for network analysis J Glanfield, S Brooks, T Taylor, D Paterson, C Smith, C Gates, J McHugh 2009 6th International Workshop on Visualization for Cyber Security, 11-19, 2009 | 29 | 2009 |
BotMeter: Charting DGA-botnet landscapes in large networks T Wang, X Hu, J Jang, S Ji, M Stoecklin, T Taylor 2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016 | 26 | 2016 |
Filesystem view separation for data confidentiality and integrity using lattice-based security domains F Araujo, MP Stoecklin, TP Taylor US Patent 11,562,086, 2023 | 24 | 2023 |
Methods, systems, and computer readable media for detecting a compromised computing host F Monrose, T Taylor, S Krishnan, J McHugh US Patent 9,934,379, 2018 | 20 | 2018 |
Detecting web exploit kits by tree-based structural similarity search X Hu, J Jang, F Monrose, MP Stoecklin, T Taylor, T Wang US Patent 9,516,051, 2016 | 16 | 2016 |
Defending against model inversion attacks on neural networks F Araujo, J Zhang, T Taylor, MP Stoecklin US Patent 10,733,292, 2020 | 15 | 2020 |
Application-level sandboxing F Araujo, DL Schales, MP Stoecklin, TP Taylor US Patent 10,887,346, 2021 | 13 | 2021 |
On-demand injection of software booby traps in live processes F Araujo, DL Schales, MP Stoecklin, TP Taylor US Patent 10,498,763, 2019 | 13 | 2019 |
Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire. T Taylor, KZ Snow, N Otterness, F Monrose NDSS, 2016 | 13 | 2016 |
Improving cybersecurity hygiene through JIT patching F Araujo, T Taylor Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020 | 12 | 2020 |
Toward Efficient Querying of Compressed Network Payloads. T Taylor, SE Coull, F Monrose, J McHugh USENIX Annual Technical Conference, 113-124, 2012 | 11 | 2012 |
Identification and extraction of key forensics indicators of compromise using subject-specific filesystem views F Araujo, AE Kohlbrenner, MP Stoecklin, TP Taylor US Patent App. 16/019,761, 2020 | 9 | 2020 |
Dressed up: Baiting attackers through endpoint service projection MP Stoecklin, J Zhang, F Araujo, T Taylor Proceedings of the 2018 ACM International Workshop on Security in Software …, 2018 | 8 | 2018 |
Cyber-deception using network port projection F Araujo, DL Schales, MP Stoecklin, TP Taylor US Patent 10,979,453, 2021 | 7 | 2021 |