Obserwuj
Joshua C Neil
Joshua C Neil
Founder, Alpha Level
Zweryfikowany adres z alphalevelsec.com
Tytuł
Cytowane przez
Cytowane przez
Rok
Graph-based malware detection using dynamic analysis
B Anderson, D Quist, J Neil, C Storlie, T Lane
Journal in computer Virology 7, 247-258, 2011
4002011
Eliminating steganography in Internet traffic with active wardens
G Fisk, M Fisk, C Papadopoulos, J Neil
Information Hiding: 5th International Workshop, IH 2002 Noordwijkerhout, The …, 2003
2712003
Scan statistics for the online detection of locally anomalous subgraphs
J Neil, C Hash, A Brugh, M Fisk, CB Storlie
Technometrics 55 (4), 403-414, 2013
1672013
Authentication graphs: Analyzing user behavior within an enterprise network
AD Kent, LM Liebrock, JC Neil
Computers & Security 48, 150-166, 2015
1002015
Anomaly detection to identify coordinated group attacks in computer networks
JC Neil, M Turcotte, NA Heard
US Patent App. 14/383,024, 2015
812015
Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness
JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent
US Patent 9,560,065, 2017
732017
A large-scale database for graph representation learning
S Freitas, Y Dong, J Neil, DH Chau
arXiv preprint arXiv:2011.07682, 2020
722020
Attack chain detection
J Sexton, C Storlie, J Neil
Statistical Analysis and Data Mining: The ASA Data Science Journal 8 (5-6 …, 2015
722015
Detecting cyber attacks using anomaly detection with explanations and expert feedback
MA Siddiqui, JW Stokes, C Seifert, E Argyle, R McCann, J Neil, J Carroll
ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019
632019
Connected components and credential hopping in authentication graphs
A Hagberg, N Lemons, A Kent, J Neil
2014 Tenth International Conference on Signal-Image Technology and Internet …, 2014
462014
Living-off-the-land command detection using active learning
T Ongun, JW Stokes, JB Or, K Tian, F Tajaddodianfar, J Neil, C Seifert, ...
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
402021
Dynamic networks and cyber-security
NM Adams, NA Heard
World Scientific, 2016
372016
Using new edges for anomaly detection in computer networks
JC Neil
US Patent 9,038,180, 2015
362015
Detecting anomalous behavior via user authentication graphs
A Kent, J Neil, L Liebrock
US Patent 10,015,175, 2018
292018
Improving antivirus accuracy with hypervisor assisted analysis
D Quist, L Liebrock, J Neil
Journal in computer virology 7, 121-131, 2011
272011
Path scanning for the detection of anomalous subgraphs and use of dns requests and host agents for anomaly/change detection and network situational awareness
JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent
US Patent App. 16/278,225, 2019
252019
D2M: Dynamic Defense and Modeling of Adversarial Movement in Networks
S Freitas, A Wicker, DH Chau, J Neil
Proceedings of the 2020 SIAM International Conference on Data Mining, 541-549, 2020
242020
Anomaly detection in large-scale networks with latent space models
W Lee, TH McCormick, J Neil, C Sodja, Y Cui
Technometrics 64 (2), 241-252, 2022
212022
A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks
J Grana, D Wolpert, J Neil, D Xie, T Bhattacharya, R Bent
Journal of Network and Computer Applications 66, 166-179, 2016
192016
Towards improved detection of attackers in computer networks: New edges, fast updating, and host agents
J Neil, B Uphoff, C Hash, C Storlie
2013 6th International Symposium on Resilient Control Systems (ISRCS), 218-224, 2013
192013
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20