Charles LeDoux
Charles LeDoux
Verified email at - Homepage
Cited by
Cited by
Identifying shared software components to support malware forensics
B Ruttenberg, C Miles, L Kellogg, V Notani, M Howard, C LeDoux, ...
Detection of Intrusions and Malware, and Vulnerability Assessment: 11th …, 2014
Malware and machine learning
C LeDoux, A Lakhotia
Intelligent Methods for Cyber Warfare, 1-42, 2014
VirusBattle: State-of-the-art malware analysis for better cyber threat intelligence
C Miles, A Lakhotia, C LeDoux, A Newsom, V Notani
2014 7th International Symposium on Resilient Control Systems (ISRCS), 1-6, 2014
Instruction embedding for improved obfuscation
C LeDoux, M Sharkey, B Primeaux, C Miles
Proceedings of the 50th annual southeast regional conference, 130-135, 2012
{FuncTracker}: Discovering Shared Code to Aid Malware Forensics
C LeDoux, A Lakhotia, C Miles, V Notani, A Pfeffer
6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 13), 2013
Cluster analysis for deobfuscation of malware variants during ransomware attacks
A Arrott, A Lakhotia, F Leitold, C LeDoux
2018 international conference on cyber situational awareness, data analytics …, 2018
Improved malware classification through sensor fusion using disjoint union
C LeDoux, A Walenstein, A Lakhotia
Information Systems, Technology and Management: 6th International Conference …, 2012
Malware economics and its implication to anti-malware situational awareness
A Lakhotia, V Notani, C LeDoux
2018 International Conference On Cyber Situational Awareness, Data Analytics …, 2018
Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks
C LeDoux
University of Louisiana at Lafayette, 2016
Feature Fusion Across Domains for Improved Malware Classification
C LeDoux
University of Louisiana at Lafayette, 2011
The system can't perform the operation now. Try again later.
Articles 1–10