URET: Universal Robustness Evaluation Toolkit (for Evasion)Kevin EykholtTaesung Leeet al.2023USENIX Security 2023
BAYWATCH: Robust beaconing detection to identify infected hosts in large-scale enterprise networksXin HuJiyong Janget al.2016DSN 2016
Scalable analytics to detect DNS misuse for establishing stealthy communication channelsDouglas L. SchalesJiyong Janget al.2016IBM J. Res. Dev
Passive security intelligence to analyze the security risks of mobile/BYOD activitiesMarc StoecklinKapil Singhet al.2016IBM J. Res. Dev
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibilityS. BergerY. Chenet al.2016IBM J. Res. Dev
FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analyticsDouglas L. SchalesXin Huet al.2015ICDE 2015
Asset risk scoring in enterprise network with mutually reinforced reputation propagationXin HuTing Wanget al.2014S&P 2014
Kaleido: Network traffic attribution using multifaceted footprintingTing WangFei Wanget al.2014SDM 2014
Stream computing for large-scale, multi-channel cyber threat analyticsDouglas L. SchalesMihai Christodorescuet al.2014IRI 2014