Publications

Filter by type:
. TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. USENIX Security Symposium, 2019.

PDF Code Dataset Project Site USENIX ENIGMA talk

. Detection and Threat Prioritization of Pivoting Attacks in Large Networks. IEEE Transactions on Emerging Topics in Computing (TETC), 2017.

PDF

. Scalable Architecture for Online Prioritisation of Cyber Threats. IEEE CyCon, 2017.

PDF

. EC2: Ensemble Clustering and Classification for Predicting Android Malware Families. IEEE Transactions on Dependable and Secure Computing (TDSC), 2017.

PDF

. A Probabilistic Logic of Cyber Deception. IEEE Transactions on Information Forensics and Security (TIFS), 2017.

PDF

. Analysis of High Volumes of Network Traffic for Advanced Persistent Threat Detection. Elsevier Computer Networks Journal (ComNet), 2016.

PDF

. Countering Advanced Persistent Threats through security intelligence and big data analytics. IEEE CyCon, 2016.

PDF

. Exploratory Security Analytics for Anomaly Detection. Elsevier Computers & Security Journal, 2016.

PDF

. The Network Perspective of Cloud Security. IEEE NCCA, 2015.

PDF

. Scalable Architecture for Multi-User Encrypted SQL Operations on Cloud Database Services. IEEE Transactions on Cloud Computing (TCC), 2014.

PDF

. Security and privacy of location-based services for in-vehicle device systems. LSAUC Workshop (co-located IEEE HPCS), 2014.

PDF

. Efficient detection of unauthorized data modification in cloud databases. IEEE ISCC, 2014.

PDF

. Performance and Cost Evaluation of an Adaptive Encryption Architecture for Cloud Databases. IEEE Transactions on Cloud Computing (TCC), 2014.

PDF

. Security and confidentiality solutions for public cloud database services. SECURWARE [Best Paper Award], 2013.

PDF

. . 0001.