Flovis: Flow visualization system T Taylor, D Paterson, J Glanfield, C Gates, S Brooks, J McHugh 2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009 | 85 | 2009 |
Methods, systems, and computer readable media for detecting malicious network traffic TP Taylor, KZ Snow, NM Otterness, FN Monrose US Patent 9,992,217, 2018 | 63 | 2018 |
Detecting web exploit kits by tree-based structural similarity search X Hu, J Jang, F Monrose, MP Stoecklin, T Taylor, T Wang US Patent 9,723,016, 2017 | 53 | 2017 |
Detecting malicious exploit kits using tree-based similarity searches T Taylor, X Hu, T Wang, J Jang, MP Stoecklin, F Monrose, R Sailer proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016 | 44 | 2016 |
Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing S Krishnan, T Taylor, F Monrose, J McHugh 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013 | 42 | 2013 |
NetBytes viewer: An entity-based netflow visualization utility for identifying intrusive behavior T Taylor, S Brooks, J McHugh VizSEC 2007: Proceedings of the Workshop on Visualization for Computer …, 2008 | 39 | 2008 |
Over flow: An overview visualization for network analysis J Glanfield, S Brooks, T Taylor, D Paterson, C Smith, C Gates, J McHugh 2009 6th International Workshop on Visualization for Cyber Security, 11-19, 2009 | 31 | 2009 |
BotMeter: Charting DGA-botnet landscapes in large networks T Wang, X Hu, J Jang, S Ji, M Stoecklin, T Taylor 2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016 | 25 | 2016 |
Defending against model inversion attacks on neural networks F Araujo, J Zhang, T Taylor, MP Stoecklin US Patent 10,733,292, 2020 | 23 | 2020 |
Methods, systems, and computer readable media for detecting a compromised computing host F Monrose, T Taylor, S Krishnan, J McHugh US Patent 9,934,379, 2018 | 23 | 2018 |
Cyber-deception using network port projection F Araujo, DL Schales, MP Stoecklin, TP Taylor US Patent 10,979,453, 2021 | 20 | 2021 |
Improving cybersecurity hygiene through JIT patching F Araujo, T Taylor Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020 | 17 | 2020 |
Detecting web exploit kits by tree-based structural similarity search X Hu, J Jang, F Monrose, MP Stoecklin, T Taylor, T Wang US Patent 9,516,051, 2016 | 17 | 2016 |
Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire. T Taylor, KZ Snow, N Otterness, F Monrose NDSS, 2016 | 17 | 2016 |
On-demand injection of software booby traps in live processes F Araujo, DL Schales, MP Stoecklin, TP Taylor US Patent 10,498,763, 2019 | 16 | 2019 |
Application-level sandboxing F Araujo, DL Schales, MP Stoecklin, TP Taylor US Patent 10,887,346, 2021 | 15 | 2021 |
Detecting adversarial attacks through decoy training J Zhang, F Araujo, T Taylor, MP Stoecklin US Patent 11,501,156, 2022 | 14 | 2022 |
Identification and extraction of key forensics indicators of compromise using subject-specific filesystem views F Araujo, AE Kohlbrenner, MP Stoecklin, TP Taylor US Patent 11,775,638, 2023 | 12 | 2023 |
Cross-stack threat sensing for cyber security and resilience F Araujo, T Taylor, J Zhang, M Stoecklin 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018 | 10 | 2018 |
Toward {Efficient} Querying of Compressed Network Payloads T Taylor, SE Coull, F Monrose, J McHugh 2012 USENIX Annual Technical Conference (USENIX ATC 12), 113-124, 2012 | 10 | 2012 |