Charles LeDoux
Charles LeDoux
Verified email at louisiana.edu - Homepage
Title
Cited by
Cited by
Year
Identifying shared software components to support malware forensics
B Ruttenberg, C Miles, L Kellogg, V Notani, M Howard, C LeDoux, ...
International Conference on Detection of Intrusions and Malware, and …, 2014
432014
Malware and machine learning
C LeDoux, A Lakhotia
Intelligent Methods for Cyber Warfare, 1-42, 2015
322015
VirusBattle: State-of-the-art malware analysis for better cyber threat intelligence
C Miles, A Lakhotia, C LeDoux, A Newsom, V Notani
2014 7th International Symposium on Resilient Control Systems (ISRCS), 1-6, 2014
262014
Instruction embedding for improved obfuscation
C LeDoux, M Sharkey, B Primeaux, C Miles
Proceedings of the 50th annual southeast regional conference, 130-135, 2012
182012
Functracker: Discovering shared code to aid malware forensics
C LeDoux, A Lakhotia, C Miles, V Notani, A Pfeffer
6th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 13), 2013
122013
Improved malware classification through sensor fusion using disjoint union
C LeDoux, A Walenstein, A Lakhotia
International Conference on Information Systems, Technology and Management …, 2012
62012
Malware economics and its implication to anti-malware situational awareness
A Lakhotia, V Notani, C LeDoux
2018 International Conference On Cyber Situational Awareness, Data Analytics …, 2018
32018
Cluster analysis for deobfuscation of malware variants during ransomware attacks
A Arrott, A Lakhotia, F Leitold, C LeDoux
2018 International Conference On Cyber Situational Awareness, Data Analytics …, 2018
22018
Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks
C LeDoux
University of Louisiana at Lafayette, 2016
2016
Feature Fusion Across Domains for Improved Malware Classification
C LeDoux
University of Louisiana at Lafayette, 2011
2011
The system can't perform the operation now. Try again later.
Articles 1–10