Identifying shared software components to support malware forensics B Ruttenberg, C Miles, L Kellogg, V Notani, M Howard, C LeDoux, ... Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014 | 49 | 2014 |
Vilo: a rapid learning nearest-neighbor classifier for malware triage A Lakhotia, A Walenstein, C Miles, A Singh Journal of Computer Virology and Hacking Techniques 9 (3), 109-123, 2013 | 43 | 2013 |
VirusBattle: State-of-the-art malware analysis for better cyber threat intelligence C Miles, A Lakhotia, C LeDoux, A Newsom, V Notani 2014 7th International Symposium on Resilient Control Systems (ISRCS), 1-6, 2014 | 37 | 2014 |
Instruction embedding for improved obfuscation C LeDoux, M Sharkey, B Primeaux, C Miles Proceedings of the 50th annual southeast regional conference, 130-135, 2012 | 21 | 2012 |
Artificial intelligence based malware analysis A Pfeffer, B Ruttenberg, L Kellogg, M Howard, C Call, A O'Connor, ... arXiv preprint arXiv:1704.08716, 2017 | 19 | 2017 |
Fast model learning for the detection of malicious digital documents D Scofield, C Miles, S Kuhn Proceedings of the 7th Software Security, Protection, and Reverse …, 2017 | 15 | 2017 |
{FuncTracker}: Discovering Shared Code to Aid Malware Forensics C LeDoux, A Lakhotia, C Miles, V Notani, A Pfeffer 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 13), 2013 | 15 | 2013 |
Beyond the hype: A real-world evaluation of the impact and cost of machine learning-based malware detection RA Bridges, S Oesch, ME Verma, MD Iannacone, KMT Huffer, B Jewell, ... arXiv preprint arXiv:2012.09214, 2020 | 9 | 2020 |
An assessment of the usability of machine learning based tools for the security operations center S Oesch, R Bridges, J Smith, J Beaver, J Goodall, K Huffer, C Miles, ... 2020 International Conferences on Internet of Things (iThings) and IEEE …, 2020 | 8 | 2020 |
Automated model learning for accurate detection of malicious digital documents D Scofield, C Miles, S Kuhn Digital Threats: Research and Practice 1 (3), 1-21, 2020 | 4 | 2020 |
In situ reuse of logically extracted functional components C Miles, A Lakhotia, A Walenstein Journal in Computer Virology, 1-12, 2012 | 4 | 2012 |
Entity resolution-based malicious file detection D Scofield, C Miles US Patent 10,754,950, 2020 | 2 | 2020 |
Early History of the Computer Virus C Miles Prof. Dasgupta’s History of Computer Science The Center for Advanced …, 2012 | 1 | 2012 |
Elicitation of a Program's Behaviors CS Miles University of Louisiana at Lafayette, 2015 | | 2015 |
MODERN STEGANOGRAPHY: AN OVERVIEW C Miles The University of Montana, 2010 | | 2010 |