Richard E. Harang
Affiliations:- Sophos
- US Army Research Laboratory, Adelphi, MD, USA (former)
According to our database1,
Richard E. Harang
authored at least 37 papers
between 2012 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on harang.org
On csauthors.net:
Bibliography
2023
2020
2019
Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments.
Proc. Priv. Enhancing Technol., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
2018
A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Git blame who?: stylistic authorship attribution of small, incomplete source code fragments.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
2017
Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach.
IEEE Trans. Inf. Forensics Secur., 2017
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017
2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Proceedings of the 2016 SIAM International Conference on Data Mining, 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 2016
Micro-signatures: The Effectiveness of Known Bad N-Grams for Network Anomaly Detection.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
2014
Proceedings of the Cyber Defense and Situational Awareness, 2014
Bridging the Semantic Gap: Human Factors in Anomaly-Based Intrusion Detection Systems.
Proceedings of the Network Science and Cybersecurity, 2014
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014
Lightweight Packing of Log Files for Improved Compression in Mobile Tactical Networks.
Proceedings of the 2014 IEEE Military Communications Conference, 2014
2013
Rapid Permissions-Based Detection and Analysis of Mobile Malware Using Random Decision Forests.
Proceedings of the 32th IEEE Military Communications Conference, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
Proceedings of the 31st IEEE Military Communications Conference, 2012
Identification of anomalous network security token usage via clustering and density estimation.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012