Jose Andre Morales

Orcid: 0000-0001-7177-8192

According to our database1, Jose Andre Morales authored at least 38 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Insights on Implementing a Metrics Baseline for Post-Deployment AI Container Monitoring.
Proceedings of the 2024 International Conference on Software and Systems Processes, 2024

2023
Experiences with Secure Pipelines in Highly Regulated Environments.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Analyzing temporal graphs of malware distribution networks.
Array, 2022

2020
Cyber Attribution from Topological Patterns.
Proceedings of the Computational Science - ICCS 2020, 2020

Security impacts of sub-optimal DevSecOps implementations in a highly regulated environment.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Deception, identity, and security: the game theory of sybil attacks.
Commun. ACM, 2019

Perceiving Behavior of Cyber Malware with Human-Machine Teaming.
Proceedings of the Advances in Human Factors in Cybersecurity, 2019

2018
Weaving Security into DevOps Practices in Highly Regulated Environments.
Int. J. Syst. Softw. Secur. Prot., 2018

Implementing DevOps practices in highly regulated environments.
Proceedings of the 19th International Conference on Agile Software Development, 2018

Pheromone Model Based Visualization of Malware Distribution Networks.
Proceedings of the Computational Science - ICCS 2018, 2018

2017
Malware Fingerprinting under Uncertainty.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

Using semi-supervised machine learning to address the Big Data problem in DNS networks.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

2016
Identity Deception and Game Deterrence via Signaling Games.
EAI Endorsed Trans. Security Safety, 2016

Epistatic Signaling and Minority Games, the Adversarial Dynamics in Social Technological Systems.
Mob. Networks Appl., 2016

Threats from Inside: Dynamic Utility (Mis)Alignments in an Agent based Model.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Compliance signaling games: toward modeling the deterrence of insider threats.
Comput. Math. Organ. Theory, 2016

Visualizing a Malware Distribution Network.
Proceedings of the 13th IEEE Symposium on Visualization for Cyber Security, 2016

Dynamic Android Malware Classification Using Graph-Based Representations.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

2015
A Method and Case Study for Using Malware Analysis to Improve Security Requirements.
Int. J. Secur. Softw. Eng., 2015

Using inherent command and control vulnerabilities to halt DDoS attacks.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

Sandboxing and reasoning on malware infection trees.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

2014
Using malware analysis to improve security requirements on future systems.
Proceedings of the IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering, 2014

Agent-based trace learning in a recommendation-verification system for cybersecurity.
Proceedings of the 9th International Conference on Malicious and Unwanted Software: The Americas MALWARE 2014, 2014

Cyber Security via Signaling Games: Toward a Science of Cyber Security.
Proceedings of the Distributed Computing and Internet Technology, 2014

Cyber Security via Minority Games with Epistatic Signaling.
Proceedings of the 8th International Conference on Bio-inspired Information and Communications Technologies, 2014

2011
Building malware infection trees.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011

Proximax: Measurement-Driven Proxy Dissemination (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Identification of file infecting viruses through detection of self-reference replication.
J. Comput. Virol., 2010

Analyzing and Exploiting Network Behaviors of Malware.
Proceedings of the Security and Privacy in Communication Networks, 2010

Symptoms-Based Detection of Bot Processes.
Proceedings of the Computer Network Security, 2010

Evaluating detection and treatment effectiveness of commercial anti-malware programs.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Analyzing DNS activities of bot processes.
Proceedings of the 4th International Conference on Malicious and Unwanted Software, 2009

2008
Characterization of virus replication.
J. Comput. Virol., 2008

Characterizing and Detecting Virus Replication.
Proceedings of the Third International Conference on Systems, 2008

Threat of renovated .NET viruses to mobile devices.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

2006
Testing and evaluating virus detectors for handheld devices.
J. Comput. Virol., 2006


  Loading...