Frederico Araujo
Frederico Araujo
IBM Research
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα ibm.com - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation
F Araujo, KW Hamlen, S Biedermann, S Katzenbeisser
21st ACM Conference on Computer and Communications Security (CCS’14), 2014
842014
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.
E Bauman, Z Lin, KW Hamlen
NDSS, 2018
462018
DIVAs 4.0: A multi-agent based simulation framework
M Al-Zinati, F Araujo, D Kuiper, J Valente, RZ Wenkstern
2013 IEEE/ACM 17th International Symposium on Distributed Simulation and …, 2013
282013
Compiler-instrumented, dynamic secret-redaction of legacy processes for attacker deception
F Araujo, W Kevin
24th {USENIX} Security Symposium ({USENIX} Security 15), 145-159, 2015
182015
Experiences with Honey-Patching in Active Cyber Security Education
F Araujo, M Shapouri, S Pandey, KW Hamlen
8th Workshop on Cyber Security Experimentation and Test, 2015
162015
Threat intelligence computing
X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang, H Huang, JR Rao
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
142018
Divas 4.0: A framework for the development of situated multi-agent based simulation systems
F Araujo, J Valente, M Al-Zinati, D Kuiper, R Zalila-Wenkstern
Proceedings of the 2013 international conference on Autonomous agents and …, 2013
102013
Unsupervised Deep Embedding for Novel Class Detection over Data Stream
A Mustafa, G Ayoade, K Al-Naami, L Khan, K Hamlen, B Thuraisingham, ...
Proceedings of the IEEE International Conference on BigData, 2017
82017
Automating Cyberdeception Evaluation with Deep Learning.
G Ayoade, F Araujo, K Al-Naami, AM Mustafa, Y Gao, KW Hamlen, L Khan
HICSS, 1-10, 2020
52020
Improving intrusion detectors by crook-sourcing
F Araujo, G Ayoade, K Al-Naami, Y Gao, KW Hamlen, L Khan
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
52019
Modeling agent-based traffic simulation properties in Alloy
F Araujo, J Valente, RZ Wenkstern
Proceedings of the 2012 Symposium on Agent Directed Simulation, 5, 2012
52012
Deception-enhanced threat sensing for resilient intrusion detection
F Araujo, G Ayoade, KW Hamlen, L Khan
Autonomous Cyber Deception, 147-165, 2019
42019
Dressed up: Baiting attackers through endpoint service projection
MP Stoecklin, J Zhang, F Araujo, T Taylor
Proceedings of the 2018 ACM International Workshop on Security in Software …, 2018
42018
Embedded honeypotting
F Araujo, KW Hamlen
Cyber Deception, 201-231, 2016
42016
Hidden in plain sight: Filesystem view separation for data integrity and deception
T Taylor, F Araujo, A Kohlbrenner, MP Stoecklin
International Conference on Detection of Intrusions and Malware, and …, 2018
32018
Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality.
A Kohlbrenner, F Araujo, T Taylor, MP Stoecklin
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
32017
Engineering cyber-deceptive software
F Araujo
The University of Texas at Dallas, 2016
32016
Filesystem view separation for data confidentiality and integrity using lattice-based security domains
F Araujo, MP Stoecklin, TP Taylor
US Patent App. 16/019,793, 2020
22020
Defending against model inversion attacks on neural networks
F Araujo, J Zhang, T Taylor, MP Stoecklin
US Patent 10,733,292, 2020
12020
Integrity, theft protection and cyber deception using a deception-based filesystem
F Araujo, DL Schales, MP Stoecklin, TP Taylor
US Patent 10,528,733, 2020
12020
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20