Cloud security is not (just) virtualization security: a short paper M Christodorescu, R Sailer, DL Schales, D Sgandurra, D Zamboni Proceedings of the 2009 ACM workshop on Cloud computing security, 97-102, 2009 | 294 | 2009 |
Adaptive cyber-security analytics L Amini, M Christodorescu, MA Cohen, S Parthasarathy, J Rao, R Sailer, ... US Patent 9,032,521, 2015 | 159 | 2015 |
Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure S Berger, Y Chen, X Hu, D Pendarakis, J Rao, R Sailer, DL Schales, ... US Patent 9,832,217, 2017 | 149 | 2017 |
Optimizing performance of integrity monitoring N Aaraj, M Christodorescu, D Pendarakis, R Sailer, DL Schales US Patent 8,949,797, 2015 | 101 | 2015 |
Methods apparatus and program products for wireless access points DC Challener, GM Kump, FE Noel Jr, DR Safford, DL Schales, ... US Patent 7,380,268, 2008 | 86 | 2008 |
Threat intelligence computing X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang, H Huang, JR Rao Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 83 | 2018 |
Practical comprehensive bounds on surreptitious communication over {DNS} V Paxson, M Christodorescu, M Javed, J Rao, R Sailer, DL Schales, ... 22nd USENIX Security Symposium (USENIX Security 13), 17-32, 2013 | 73 | 2013 |
The TAMU security package: An ongoing response to internet intruders in an academic environment DR Safford, DL Schales, DK Hess In DeHart [5, 1993 | 71 | 1993 |
Predicting attacks based on probabilistic game-theory M Christodorescu, D Korzhyk, R Sailer, DL Schales, MP Stoecklin, ... US Patent 8,863,293, 2014 | 50 | 2014 |
BAYWATCH: robust beaconing detection to identify infected hosts in large-scale enterprise networks X Hu, J Jang, MP Stoecklin, T Wang, DL Schales, D Kirat, JR Rao 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 42 | 2016 |
Identification and classification of web traffic inside encrypted network tunnels M Christodorescu, X Hu, DL Schales, R Sailer, MP Stoecklin, T Wang, ... US Patent 9,106,536, 2015 | 40 | 2015 |
Multi-point causality tracking in cyber incident reasoning X Shu, DL Schales, MP Stoecklin US Patent 10,956,566, 2021 | 39 | 2021 |
Cognitive scoring of asset risk based on predictive propagation of security-related events X Hu, R Sailer, DL Schales, MP Stoecklin, T Wang US Patent App. 14/229,155, 2015 | 32 | 2015 |
Predicting attacks based on probabilistic game-theory M Christodorescu, D Korzhyk, R Sailer, DL Schales, MP Stoecklin, ... US Patent App. 13/487,774, 2013 | 30 | 2013 |
Secure RPC Authentication (SRA) for TELNET and FTP. D Safford, DL Schales, DK Hess USENIX Security Symposium, 1993 | 27 | 1993 |
Network data collection and response system SN Chari, PC Cheng, X Hu, L Koved, JR Rao, R Sailer, DL Schales, ... US Patent 9,854,057, 2017 | 26 | 2017 |
Cyber-deception using network port projection F Araujo, DL Schales, MP Stoecklin, TP Taylor US Patent 10,979,453, 2021 | 22 | 2021 |
Network data packet classification and demultiplexing DL Schales, S Seshan, M Zohar US Patent 7,200,684, 2007 | 22 | 2007 |
On-demand injection of software booby traps in live processes F Araujo, DL Schales, MP Stoecklin, TP Taylor US Patent 10,498,763, 2019 | 19 | 2019 |
Application-level sandboxing F Araujo, DL Schales, MP Stoecklin, TP Taylor US Patent 10,887,346, 2021 | 18 | 2021 |