Software asset analyzer: A system for detecting configuration anomalies.
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Cuckoo bags for exploring multikey data.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
An Adaptive Approach to Granular Real-Time Anomaly Detection.
EURASIP J. Adv. Signal Process., 2009
Mutual information applied to anomaly detection.
J. Commun. Networks, 2008
Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis.
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks.
Int. J. Sens. Networks, 2007
Using uncleanliness to predict future botnet addresses.
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007
Fates: A Granular Approach to Real-Time Anomaly Detection.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007
On capturing and containing E-mail worms.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006