Author of the publication

BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks.

, , , , , , and . DSN, page 479-490. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evidential Cyber Threat Hunting., , , , and . CoRR, (2021)SigMal: a static signal processing based malware triage., , , and . ACSAC, page 89-98. ACM, (2013)MalGene: Automatic Extraction of Malware Analysis Evasion Signature., and . ACM Conference on Computer and Communications Security, page 769-780. ACM, (2015)BareDroid: Large-Scale Analysis of Android Apps on Real Devices., , , , , , , and . ACSAC, page 71-80. ACM, (2015)BareBox: efficient malware analysis on bare-metal., , and . ACSAC, page 403-412. ACM, (2011)Scalable analytics to detect DNS misuse for establishing stealthy communication channels., , , , , , and . IBM J. Res. Dev., 60 (4): 3 (2016)BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks., , , , , , and . DSN, page 479-490. IEEE Computer Society, (2016)BareCloud: Bare-metal Analysis-based Evasive Malware Detection., , and . USENIX Security Symposium, page 287-301. USENIX Association, (2014)Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic., , , , , , and . DSN, page 76-87. IEEE, (2020)Scalable malware classification with multifaceted content features and threat intelligence., , , , , and . IBM J. Res. Dev., 60 (4): 6 (2016)