2016
Software asset analyzer: A system for detecting configuration anomalies.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2010
Cuckoo bags for exploring multikey data.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
An Adaptive Approach to Granular Real-Time Anomaly Detection.
EURASIP J. Adv. Signal Process., 2009

2008
Mutual information applied to anomaly detection.
J. Commun. Networks, 2008

Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis.
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008

2007
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks.
Int. J. Sens. Networks, 2007

Using uncleanliness to predict future botnet addresses.
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007

Fates: A Granular Approach to Real-Time Anomaly Detection.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

2006
On capturing and containing E-mail worms.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006