2024
Multiple-base Logarithmic Quantization and Application in Reduced Precision AI Computations.
Proceedings of the 31st IEEE Symposium on Computer Arithmetic, 2024
2016
I'm not sure if we're okay: uncertainty for attackers and defenders.
Proceedings of the 2016 New Security Paradigms Workshop, 2016
2015
Value-Added Results for Public Virtual Schools in California.
J. Educ. Technol. Soc., 2015
2014
Moving-Target Defenses for Computer Networks.
IEEE Secur. Priv., 2014
Bacterial quorum sensing for coordination of targeted malware.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014
2013
Authorship Is Continuous: Managing Code Plagiarism.
IEEE Secur. Priv., 2013
2012
Detecting Emulated Environments.
Int. J. Softw. Eng. Knowl. Eng., 2012
All your base are belong to US.
Proceedings of the New Security Paradigms Workshop, 2012
NextVC2 - A next generation virtual world command and control.
Proceedings of the 31st IEEE Military Communications Conference, 2012
2011
Resilience is more than availability.
Proceedings of the 2011 New Security Paradigms Workshop, 2011
Results-oriented security.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011
2010
Building a Better Boot Camp.
IEEE Secur. Priv., 2010
Proactive reputation-based defense for MANETs using radial basis function neural networks.
Proceedings of the International Joint Conference on Neural Networks, 2010
2009
Danger theory and collaborative filtering in MANETs.
J. Comput. Virol., 2009
Malware Shall Greatly Increase ....
IEEE Secur. Priv., 2009
Evaluating Security Products with Clinical Trials.
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009
Generic Danger Detection for Mission Continuity.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009
Reputation Prediction in Mobile Ad Hoc Networks Using RBF Neural Networks.
Proceedings of the Engineering Applications of Neural Networks, 2009
Security in MANETs using reputation-adjusted routing.
Proceedings of the Data Mining, 2009
2008
Probabilistic suffix models for API sequence analysis of Windows XP applications.
Pattern Recognit., 2008
A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks.
Inf. Secur. J. A Glob. Perspect., 2008
Towards the Detection of Emulated Environments via Analysis of the Stochastic Nature of System Calls.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008
Towards an ethical code for information security?
Proceedings of the 2008 Workshop on New Security Paradigms, 2008
Securing MANETs with BITSI: danger theory and mission continuity.
Proceedings of the Data Mining, 2008
2007
How good is good enough? Metrics for worm/anti-worm evaluation.
J. Comput. Virol., 2007
Open vs. closed: which source is more secure?
ACM Queue, 2007
How Not to Be Seen II: The Defenders Fight Back.
IEEE Secur. Priv., 2007
Network Distribution of Security Policies via Ant-like Foraging Behavior.
Proceedings of the International Conference on Internet and Web Applications and Services (ICIW 2007), 2007
Modeling malcode with Hephaestus: beyond simple spread.
Proceedings of the 45th Annual Southeast Regional Conference, 2007
2006
On the definition and classification of cybercrime.
J. Comput. Virol., 2006
How to Think about Security.
IEEE Secur. Priv., 2006
Predation and the cost of replication: New approaches to malware prevention?
Comput. Secur., 2006
Cent, five cent, ten cent, dollar: hitting botnets where it <i>really</i> hurts.
Proceedings of the New Security Paradigms Workshop 2006, 2006
2005
Suppressing the Spread of Email Malcode using Short-term Message Recall.
J. Comput. Virol., 2005
Malcode Mysteries Revealed.
IEEE Secur. Priv., 2005
Swarming computer security: an experiment in policy distribution.
Proceedings of the 2005 IEEE Swarm Intelligence Symposium, 2005
Internet instability and disturbance: goal or menace?
Proceedings of the New Security Paradigms Workshop 2005, 2005
Highlights from the 2005 New Security Paradigms Workshop.
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Perfect Storm: The Insider, Naivety, and Hostility.
ACM Queue, 2004
The future of virus detection.
Inf. Secur. Tech. Rep., 2004
2002
1999
No suprises in Melissa Land.
Comput. Secur., 1999
1998
May you live in interesting times.
Comput. Secur., 1998
What a littledefinution can do.
Comput. Secur., 1998
1978
Evolution of a teleprocessing network.
Comput. Commun., 1978