2024
Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
EdgeTorrent: Real-time Temporal Graph Representations for Intrusion Detection.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Debugging Malware Classification Models Based on Event Logs with Explainable AI.
Proceedings of the IEEE International Conference on Data Mining, 2023
2022
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat Discovery.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Evidential Cyber Threat Hunting.
CoRR, 2021
2020
Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Towards an Open Format for Scalable System Telemetry.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2018
Threat Intelligence Computing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Anomaly Detection as a Service: Challenges, Advances, and Opportunities
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02354-5, 2017
Long-Span Program Behavior Modeling and Attack Detection.
ACM Trans. Priv. Secur., 2017
Breaking the Target: An Analysis of Target Data Breach and Lessons Learned.
CoRR, 2017
2016
Threat Detection in Program Execution and Data Movement: Theory and Practice.
PhD thesis, 2016
Fast Detection of Transformed Data Leaks.
IEEE Trans. Inf. Forensics Secur., 2016
DECT: Distributed Evolving Context Tree for Mining Web Behavior Evolution.
Proceedings of the 19th International Conference on Extending Database Technology, 2016
Program Anomaly Detection: Methodology and Practices.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
DECT: Distributed Evolving Context Tree for Understanding User Behavior Pattern Evolution.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
2015
Privacy-Preserving Detection of Sensitive Data Exposure.
IEEE Trans. Inf. Forensics Secur., 2015
Profiling user-trigger dependence for Android malware detection.
Comput. Secur., 2015
A Formal Framework for Program Anomaly Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Rapid and parallel content screening for detecting transformed data exposure.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2013
Massive distributed and parallel log analysis for organizational security.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013
2012
Robustness of keystroke-dynamics based biometrics against synthetic forgeries.
Comput. Secur., 2012
Data Leak Detection as a Service.
Proceedings of the Security and Privacy in Communication Networks, 2012