Follow
Marc Ph. Stoecklin
Marc Ph. Stoecklin
IBM Research
Verified email at zurich.ibm.com - Homepage
Title
Cited by
Cited by
Year
Protecting intellectual property of deep neural networks with watermarking
J Zhang, Z Gu, J Jang, H Wu, MP Stoecklin, H Huang, I Molloy
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
5472018
Histogram-based traffic anomaly detection
A Kind, MP Stoecklin, X Dimitropoulos
IEEE Transactions on Network and Service Management 6 (2), 110-121, 2009
2742009
System and method for network flow traffic rate encoding
P Droz, P Hurley, A Kind, M Stoecklin
US Patent 7,911,975, 2011
2392011
Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure
S Berger, Y Chen, X Hu, D Pendarakis, J Rao, R Sailer, DL Schales, ...
US Patent 9,832,217, 2017
1382017
Net-fli: on-the-fly compression, archiving and indexing of streaming network traffic
F Fusco, MP Stoecklin, M Vlachos
Proceedings of the VLDB Endowment 3 (1-2), 1382-1393, 2010
1272010
On the 95-percentile billing method
X Dimitropoulos, P Hurley, A Kind, MP Stoecklin
Passive and Active Network Measurement: 10th International Conference, PAM …, 2009
982009
Threat intelligence computing
X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang, H Huang, JR Rao
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
712018
Practical comprehensive bounds on surreptitious communication over {DNS}
V Paxson, M Christodorescu, M Javed, J Rao, R Sailer, DL Schales, ...
22nd USENIX Security Symposium (USENIX Security 13), 17-32, 2013
672013
DeepLocker concealing targeted attacks with AI locksmithing
D Kirat, J Jang, M Stoecklin
Blackhat USA 1, 1-29, 2018
622018
Detecting web exploit kits by tree-based structural similarity search
X Hu, J Jang, F Monrose, MP Stoecklin, T Taylor, T Wang
US Patent 9,723,016, 2017
542017
Deeplocker: How AI can power a stealthy new breed of malware
MP Stoecklin, J Jang, D Kirat
Security Intelligence 8 (2018), 2018
472018
Detecting malicious exploit kits using tree-based similarity searches
T Taylor, X Hu, T Wang, J Jang, MP Stoecklin, F Monrose, R Sailer
proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
442016
Predicting attacks based on probabilistic game-theory
M Christodorescu, D Korzhyk, R Sailer, DL Schales, MP Stoecklin, ...
US Patent 8,863,293, 2014
412014
Fuzzy cyber detection pattern matching
X Shu, Z Gu, MP Stoecklin, HT Jamjoom
US Patent 11,544,527, 2023
402023
Identification and classification of web traffic inside encrypted network tunnels
M Christodorescu, X Hu, DL Schales, R Sailer, MP Stoecklin, T Wang, ...
US Patent 9,106,536, 2015
402015
Consolidating structured and unstructured security and threat intelligence with knowledge graphs
Y Park, J Jang, DH Kirat, JR Rao, MP Stoecklin
US Patent App. 15/368,845, 2018
392018
BAYWATCH: robust beaconing detection to identify infected hosts in large-scale enterprise networks
X Hu, J Jang, MP Stoecklin, T Wang, DL Schales, D Kirat, JR Rao
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
382016
Multi-point causality tracking in cyber incident reasoning
X Shu, DL Schales, MP Stoecklin
US Patent 10,956,566, 2021
362021
Cognitive offense analysis using contextual data and knowledge graphs
WA Bird, SC Deffeyes, J Jang, D Kirat, Y Park, JR Rao, MP Stoecklin
US Patent 10,542,015, 2020
352020
A two-layered anomaly detection technique based on multi-modal flow behavior models
MP Stoecklin, JY Le Boudec, A Kind
International Conference on Passive and Active Network Measurement, 212-221, 2008
352008
The system can't perform the operation now. Try again later.
Articles 1–20