Malware and machine learning C LeDoux, A Lakhotia Intelligent Methods for Cyber Warfare, 1-42, 2014 | 50 | 2014 |
Identifying shared software components to support malware forensics B Ruttenberg, C Miles, L Kellogg, V Notani, M Howard, C LeDoux, ... Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014 | 49 | 2014 |
VirusBattle: State-of-the-art malware analysis for better cyber threat intelligence C Miles, A Lakhotia, C LeDoux, A Newsom, V Notani 2014 7th International Symposium on Resilient Control Systems (ISRCS), 1-6, 2014 | 39 | 2014 |
Instruction embedding for improved obfuscation C LeDoux, M Sharkey, B Primeaux, C Miles Proceedings of the 50th annual southeast regional conference, 130-135, 2012 | 23 | 2012 |
{FuncTracker}: Discovering Shared Code to Aid Malware Forensics C LeDoux, A Lakhotia, C Miles, V Notani, A Pfeffer 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 13), 2013 | 19 | 2013 |
Cluster analysis for deobfuscation of malware variants during ransomware attacks A Arrott, A Lakhotia, F Leitold, C LeDoux 2018 international conference on cyber situational awareness, data analytics …, 2018 | 7 | 2018 |
Improved malware classification through sensor fusion using disjoint union C LeDoux, A Walenstein, A Lakhotia Information Systems, Technology and Management: 6th International Conference …, 2012 | 6 | 2012 |
Malware economics and its implication to anti-malware situational awareness A Lakhotia, V Notani, C LeDoux 2018 International Conference On Cyber Situational Awareness, Data Analytics …, 2018 | 4 | 2018 |
Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks C LeDoux University of Louisiana at Lafayette, 2016 | 1 | 2016 |
Feature Fusion Across Domains for Improved Malware Classification C LeDoux University of Louisiana at Lafayette, 2011 | | 2011 |