Dressed up: Baiting attackers through endpoint service projectionMarc StoecklinFrederico Araujoet al.2018SDN-NFVSec 2018
BAYWATCH: Robust beaconing detection to identify infected hosts in large-scale enterprise networksXin HuJiyong Janget al.2016DSN 2016
Detecting malicious exploit kits using tree-based similarity searchesTeryl TaylorXin Huet al.2016CODASPY 2016
FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analyticsDouglas L. SchalesXin Huet al.2015ICDE 2015
Stream computing for large-scale, multi-channel cyber threat analyticsDouglas L. SchalesMihai Christodorescuet al.2014IRI 2014
A flow trace generator using graph-based traffic classification techniquesPeter SiskaMarc Ph. Stoecklinet al.2010IWCMC 2010
DeepLocker - Concealing Targeted Attacks with AI LocksmithingDhilung KiratJiyong Janget al.2018Black Hat USA 2018
Scalable analytics to detect DNS misuse for establishing stealthy communication channelsDouglas L. SchalesJiyong Janget al.2016IBM J. Res. Dev
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibilityS. BergerY. Chenet al.2016IBM J. Res. Dev