Scalable analytics to detect DNS misuse for establishing stealthy communication channelsDouglas L. SchalesJiyong Janget al.2016IBM J. Res. Dev
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibilityS. BergerY. Chenet al.2016IBM J. Res. Dev
Scalable malware classification with multifaceted content features and threat intelligenceXin HuJiyong Janget al.2016IBM J. Res. Dev
Passive security intelligence to analyze the security risks of mobile/BYOD activitiesMarc StoecklinKapil Singhet al.2016IBM J. Res. Dev