Detecting malicious endpoints using network connectivity and flow information S Saha, L Liu, R Torres, J Xu, A Nucci US Patent US8813236 B1, 2014 | 203 | 2014 |
Class discovery for automated discovery, attribution, analysis, and risk assessment of security threats A Nucci, PM Comar, S Saha, L Liu US Patent 8,418,249, 2013 | 199 | 2013 |
Nazca: Detecting Malware Distribution in Large-Scale Networks. L Invernizzi, S Miskovic, R Torres, C Kruegel, S Saha, G Vigna, SJ Lee, ... NDSS 14, 23-26, 2014 | 192 | 2014 |
Combining supervised and unsupervised learning for zero-day malware detection PM Comar, L Liu, S Saha, PN Tan, A Nucci 2013 Proceedings IEEE INFOCOM, 2022-2030, 2013 | 147 | 2013 |
Systematic mining of associated server herds for uncovering malware and attack campaigns J Zhang, S Saha, G Gu, SJ Lee, B Nardelli US Patent 9,088,598, 2015 | 123 | 2015 |
Detecting malicious http redirections using trees of user browsing activity H Mekky, R Torres, ZL Zhang, S Saha, A Nucci IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1159-1167, 2014 | 85 | 2014 |
Modeling opponent decision in repeated one-shot negotiations S Saha, A Biswas, S Sen Proceedings of the fourth international joint conference on Autonomous …, 2005 | 77 | 2005 |
Automated discovery, attribution, analysis, and risk assessment of security threats A Nucci, S Saha US Patent 9,094,288, 2015 | 74 | 2015 |
Detecting malicious HTTP redirections using user browsing activity trees R Torres, H Mekky, ZL Zhang, S Saha, A Nucci US Patent 9,531,736, 2016 | 67 | 2016 |
Reciprocal resource sharing in P2P environments D Banerjee, S Saha, S Sen, P Dasgupta Proceedings of the fourth international joint conference on Autonomous …, 2005 | 59 | 2005 |
Detecting suspicious network behaviors based on domain name service failures P Luo, R Torres, ZL Zhang, S Saha, SJ Lee, A Nucci US Patent 9,245,121, 2016 | 53 | 2016 |
Detecting malware infestations in large-scale networks L Invernizzi, S Miskovic, R Torres, S Saha, C Kruegel, A Nucci, SJ Lee, ... US Patent 8,959,643, 2015 | 47 | 2015 |
An Efficient Protocol for Negotiation over Multiple Indivisible Resources. S Saha, S Sen IJCAI 7, 1494-1499, 2007 | 38 | 2007 |
Systematic mining of associated server herds for malware campaign discovery J Zhang, S Saha, G Gu, SJ Lee, M Mellia 2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015 | 31 | 2015 |
Helping based on future expectations S Saha, S Sen, PS Dutta Proceedings of the Second International Joint Conference on Autonomous …, 2003 | 31 | 2003 |
YouLighter: A cognitive approach to unveil YouTube CDN and changes D Giordano, S Traverso, L Grimaudo, M Mellia, E Baralis, A Tongaonkar, ... IEEE Transactions on Cognitive Communications and Networking 1 (2), 161-174, 2015 | 30 | 2015 |
Detecting malicious clients in isp networks using http connectivity graph and flow information L Liu, S Saha, R Torres, J Xu, PN Tan, A Nucci, M Mellia 2014 IEEE/ACM International Conference on Advances in Social Networks …, 2014 | 27 | 2014 |
MAGMA network behavior classifier for malware traffic E Bocchi, L Grimaudo, M Mellia, E Baralis, S Saha, S Miskovic, ... Computer Networks 109, 142-156, 2016 | 26 | 2016 |
Evolutionary tournament-based comparison of learning and non-learning algorithms for iterated games S Airiau, S Saha, S Sen Journal of Artificial Societies and Social Simulation 10 (3), 7, 2007 | 19* | 2007 |
Recursive nmf: Efficient label tree learning for large multi-class problems L Liu, PM Comar, S Saha, PN Tan, A Nucci Proceedings of the 21st International Conference on Pattern Recognition …, 2012 | 18 | 2012 |