Teryl Taylor
Teryl Taylor
Research Staff Member, IBM Research
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα ibm.com
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Flovis: Flow visualization system
T Taylor, D Paterson, J Glanfield, C Gates, S Brooks, J McHugh
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
762009
NetBytes viewer: An entity-based netflow visualization utility for identifying intrusive behavior
T Taylor, S Brooks, J McHugh
VizSEC 2007, 101-114, 2008
362008
Detecting malicious exploit kits using tree-based similarity searches
T Taylor, X Hu, T Wang, J Jang, MP Stoecklin, F Monrose, R Sailer
proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
312016
Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing
S Krishnan, T Taylor, F Monrose, J McHugh
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
312013
Over flow: An overview visualization for network analysis
J Glanfield, S Brooks, T Taylor, D Paterson, C Smith, C Gates, J McHugh
2009 6th International Workshop on Visualization for Cyber Security, 11-19, 2009
272009
Detecting web exploit kits by tree-based structural similarity search
X Hu, J Jang, F Monrose, MP Stoecklin, T Taylor, T Wang
US Patent 9,723,016, 2017
202017
BotMeter: Charting DGA-botnet landscapes in large networks
T Wang, X Hu, J Jang, S Ji, M Stoecklin, T Taylor
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
182016
Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire.
T Taylor, KZ Snow, N Otterness, F Monrose
NDSS, 2016
122016
Methods, systems, and computer readable media for detecting a compromised computing host
F Monrose, T Taylor, S Krishnan, J McHugh
US Patent 9,934,379, 2018
102018
Detecting web exploit kits by tree-based structural similarity search
X Hu, J Jang, F Monrose, MP Stoecklin, T Taylor, T Wang
US Patent 9,516,051, 2016
102016
Methods, systems, and computer readable media for detecting malicious network traffic
TP Taylor, KZ Snow, NM Otterness, FN Monrose
US Patent 9,992,217, 2018
92018
Toward Efficient Querying of Compressed Network Payloads.
T Taylor, SE Coull, F Monrose, J McHugh
USENIX Annual Technical Conference, 113-124, 2012
92012
Dressed up: Baiting attackers through endpoint service projection
MP Stoecklin, J Zhang, F Araujo, T Taylor
Proceedings of the 2018 ACM International Workshop on Security in Software …, 2018
42018
FloVis: Leveraging visualization to protect sensitive network infrastructure
J Glanfield, D Paterson, C Smith, T Taylor, S Brooks, C Gates, J McHugh
DALHOUSIE UNIV HALIFAX (NOVA SCOTIA), 2010
42010
FloVis: a network security visualization framework
T Taylor
Dalhousie University, 2009
42009
Filesystem view separation for data confidentiality and integrity using lattice-based security domains
F Araujo, MP Stoecklin, TP Taylor
US Patent App. 16/019,793, 2020
32020
Hidden in plain sight: Filesystem view separation for data integrity and deception
T Taylor, F Araujo, A Kohlbrenner, MP Stoecklin
International Conference on Detection of Intrusions and Malware, and …, 2018
32018
POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality
A Kohlbrenner, F Araujo, T Taylor, MP Stoecklin
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
32017
Defending against model inversion attacks on neural networks
F Araujo, J Zhang, T Taylor, MP Stoecklin
US Patent 10,733,292, 2020
22020
Detecting web exploit kits by tree-based structural similarity search
X Hu, J Jang, F Monrose, MP Stoecklin, T Taylor, T Wang
US Patent 10,560,471, 2020
12020
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20