Marc Ph. Stoecklin
Marc Ph. Stoecklin
IBM Research
Verifierad e-postadress på - Startsida
Citeras av
Citeras av
Histogram-based traffic anomaly detection
A Kind, MP Stoecklin, X Dimitropoulos
IEEE Transactions on Network and Service Management 6 (2), 110-121, 2009
System and method for network flow traffic rate encoding
P Droz, P Hurley, A Kind, M Stoecklin
US Patent 7,911,975, 2011
Net-fli: on-the-fly compression, archiving and indexing of streaming network traffic
F Fusco, MP Stoecklin, M Vlachos
Proceedings of the VLDB Endowment 3 (1-2), 1382-1393, 2010
On the 95-percentile billing method
X Dimitropoulos, P Hurley, A Kind, MP Stoecklin
International Conference on Passive and Active Network Measurement, 207-216, 2009
Protecting intellectual property of deep neural networks with watermarking
J Zhang, Z Gu, J Jang, H Wu, MP Stoecklin, H Huang, I Molloy
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
Practical Comprehensive Bounds on Surreptitious Communication over {DNS}
V Paxson, M Christodorescu, M Javed, J Rao, R Sailer, DL Schales, ...
Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security …, 2013
A two-layered anomaly detection technique based on multi-modal flow behavior models
MP Stoecklin, JY Le Boudec, A Kind
International Conference on Passive and Active Network Measurement, 212-221, 2008
The eternal sunshine of the sketch data structure
X Dimitropoulos, M Stoecklin, P Hurley, A Kind
Computer Networks 52 (17), 3248-3257, 2008
Detecting malicious exploit kits using tree-based similarity searches
T Taylor, X Hu, T Wang, J Jang, MP Stoecklin, F Monrose, R Sailer
proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
Real-time creation of bitmap indexes on streaming network data
F Fusco, M Vlachos, MP Stoecklin
The VLDB Journal 21 (3), 287-307, 2012
Predicting attacks based on probabilistic game-theory
M Christodorescu, D Korzhyk, R Sailer, DL Schales, MP Stoecklin, ...
US Patent 8,863,293, 2014
Automatic address range detection for IP networks
B Jansen, A Kind, MP Stoecklin
US Patent 9,112,945, 2015
Identification and classification of web traffic inside encrypted network tunnels
M Christodorescu, X Hu, DL Schales, R Sailer, MP Stoecklin, T Wang, ...
US Patent 9,106,536, 2015
Methods, systems and computer program products for detecting flow-level network traffic anomalies via abstraction levels
PT Hurley, A Kind, MP Stoecklin
US Patent 7,962,611, 2011
A flow trace generator using graph-based traffic classification techniques
P Siska, MP Stoecklin, A Kind, T Braun
Proceedings of the 6th International Wireless Communications and Mobile …, 2010
FCCE: highly scalable distributed feature collection and correlation engine for low latency big data analytics
DL Schales, X Hu, J Jang, R Sailer, MP Stoecklin, T Wang
2015 IEEE 31st International Conference on Data Engineering, 1316-1327, 2015
Predicting attacks based on probabilistic game-theory
M Christodorescu, D Korzhyk, R Sailer, DL Schales, MP Stoecklin, ...
US Patent App. 13/487,774, 2013
Anomaly detection by finding feature distribution outliers
M Stoecklin
Proceedings of the 2006 ACM CoNEXT conference, 1-2, 2006
BAYWATCH: robust beaconing detection to identify infected hosts in large-scale enterprise networks
X Hu, J Jang, MP Stoecklin, T Wang, DL Schales, D Kirat, JR Rao
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
Deeplocker: How AI can power a stealthy new breed of malware
MP Stoecklin
Security Intelligence, August 8, 2018
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20