Malware analysis and attribution using genetic information A Pfeffer, C Call, J Chamberlain, L Kellogg, J Ouellette, T Patten, ... 2012 7th International Conference on Malicious and Unwanted Software, 39-45, 2012 | 61 | 2012 |
Artificial intelligence based malware analysis A Pfeffer, B Ruttenberg, L Kellogg, M Howard, C Call, A O'Connor, ... arXiv preprint arXiv:1704.08716, 2017 | 19 | 2017 |
Fast model learning for the detection of malicious digital documents D Scofield, C Miles, S Kuhn Proceedings of the 7th Software Security, Protection, and Reverse …, 2017 | 15 | 2017 |
Beyond the hype: A real-world evaluation of the impact and cost of machine learning-based malware detection RA Bridges, S Oesch, ME Verma, MD Iannacone, KMT Huffer, B Jewell, ... arXiv preprint arXiv:2012.09214, 2020 | 8 | 2020 |
Probabilistic modeling of insider threat detection systems B Ruttenberg, D Blumstein, J Druce, M Howard, F Reed, L Wilfong, ... Graphical Models for Security: 4th International Workshop, GraMSec 2017 …, 2018 | 5 | 2018 |
Automated model learning for accurate detection of malicious digital documents D Scofield, C Miles, S Kuhn Digital Threats: Research and Practice 1 (3), 1-21, 2020 | 4 | 2020 |
Entity resolution-based malicious file detection D Scofield, C Miles US Patent 10,754,950, 2020 | 2 | 2020 |
Beyond the Hype: An Evaluation of Commercially Available Machine Learning–based Malware Detectors RA Bridges, S Oesch, MD Iannacone, KMT Huffer, B Jewell, JA Nichols, ... Digital Threats: Research and Practice 4 (2), 1-22, 2023 | 1 | 2023 |