Automated Behavioral Analysis of Malware: A Case Study of WannaCry Ransomware Q Chen, RA Bridges 2017 16th IEEE International Conference on Machine Learning and Applications …, 2017 | 278 | 2017 |
Developing an ontology for cyber security knowledge graphs M Iannacone, S Bohn, G Nakamura, J Gerth, K Huffer, R Bridges, ... Proceedings of the 10th annual cyber and information security research …, 2015 | 189 | 2015 |
Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection MR Moore, RA Bridges, FL Combs, MS Starr, SJ Prowell Proceedings of the 12th Annual Conference on Cyber and Information Security …, 2017 | 178 | 2017 |
Understanding GPU power: A survey of profiling, modeling, and simulation methods RA Bridges, N Imam, TM Mintz ACM Computing Surveys (CSUR) 49 (3), 1-27, 2016 | 142 | 2016 |
A survey of intrusion detection systems leveraging host data RA Bridges, TR Glass-Vanderlan, MD Iannacone, MS Vincent, Q Chen ACM computing surveys (CSUR) 52 (6), 1-35, 2019 | 132 | 2019 |
Automatic labeling for entity extraction in cyber security RA Bridges, CL Jones, MD Iannacone, KM Testa, JR Goodall arXiv preprint arXiv:1308.4941, 2013 | 126 | 2013 |
Towards a relation extraction framework for cyber-security concepts CL Jones, RA Bridges, KMT Huffer, JR Goodall Proceedings of the 10th Annual Cyber and Information Security Research …, 2015 | 119 | 2015 |
Situ: Identifying and explaining suspicious behavior in networks JR Goodall, ED Ragan, CA Steed, JW Reed, GD Richardson, KMT Huffer, ... IEEE transactions on visualization and computer graphics 25 (1), 204-214, 2018 | 91 | 2018 |
A comprehensive guide to CAN IDS data and introduction of the ROAD dataset ME Verma, RA Bridges, MD Iannacone, SC Hollifield, P Moriano, ... PLoS one 19 (1), e0296879, 2024 | 87* | 2024 |
Detection of anomalous events EM Ferragut, JA Laska, RA Bridges US Patent 9,361,463, 2016 | 82 | 2016 |
Pace: Pattern accurate computationally efficient bootstrapping for timely discovery of cyber-security concepts N McNeil, RA Bridges, MD Iannacone, B Czejdo, N Perez, JR Goodall 2013 12th International Conference on Machine Learning and Applications 2, 60-65, 2013 | 57 | 2013 |
Automated ransomware behavior analysis: Pattern extraction and early detection Q Chen, SR Islam, H Haswell, RA Bridges Science of Cyber Security: Second International Conference, SciSec 2019 …, 2019 | 49 | 2019 |
Graphprints: Towards a graph analytic method for network anomaly detection CR Harshaw, RA Bridges, MD Iannacone, JW Reed, JR Goodall Proceedings of the 11th Annual Cyber and Information Security Research …, 2016 | 45 | 2016 |
Exploiting the shape of CAN data for in-vehicle intrusion detection Z Tyree, RA Bridges, FL Combs, MR Moore 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), 1-5, 2018 | 40 | 2018 |
Towards malware detection via cpu power consumption: Data collection design and analytics R Bridges, JH Jiménez, J Nichols, K Goseva-Popstojanova, S Prowell 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 40* | 2018 |
CAN-D: A modular four-step pipeline for comprehensively decoding controller area network data ME Verma, RA Bridges, JJ Sosnowski, SC Hollifield, MD Iannacone IEEE Transactions on Vehicular Technology 70 (10), 9685-9700, 2021 | 39 | 2021 |
ACTT: Automotive CAN tokenization and translation M Verma, R Bridges, S Hollifield 2018 International Conference on Computational Science and Computational …, 2018 | 38 | 2018 |
A new, principled approach to anomaly detection EM Ferragut, J Laska, RA Bridges 2012 11th International Conference on Machine Learning and Applications 2 …, 2012 | 34 | 2012 |
Towards a CAN IDS based on a neural network data field predictor K Pawelec, RA Bridges, FL Combs Proceedings of the ACM workshop on automotive cybersecurity, 31-34, 2019 | 32 | 2019 |
Cybersecurity Automated Information Extraction Techniques: Drawbacks of Current Methods, and Enhanced Extractors RA Bridges, KMT Huffer, CL Jones, MD Iannacone, JR Goodall 2017 16th IEEE International Conference on Machine Learning and Applications …, 2017 | 27 | 2017 |