Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation

Xin Hu , Ting Wang , Marc Ph Stoecklin , Douglas L. Schales
ieee symposium on security and privacy 61 -64

2
2014
Towards automatic software lineage inference

Jiyong Jang , Maverick Woo , David Brumley
usenix security symposium 81 -96

103
2013
SplitScreen: enabling efficient, distributed malware detection

Iulian Moraru , John Truelove , David G. Andersen , Jiyong Jang
networked systems design and implementation 25 -25

38
2010
Authentication of Freshness for OutsourcedMulti-Version Key-Value Stores

Peter Pietzuch , Ling Liu , Yuzhe Tang , Jiyong Jang
Georgia Institute of Technology

2
2014
Consolidating structured and unstructured security and threat intelligence with knowledge graphs

Youngja Park , Josyula R. Rao , Dhilung Hang Kirat , Jiyong Jang

13
2018
Software Deception Steering through Version Emulation.

Subbarao Kambhampati , Kevin W. Hamlen , Adam Doupé , Jiyong Jang
hawaii international conference on system sciences 1988

3
2021
Rateless and pollution-attack-resilient network coding

Wentao Huang , Ting Wang , Xin Hu , Jiyong Jang
2015 IEEE International Symposium on Information Theory (ISIT) 2623 -2627

6
2015
Stream computing for large-scale, multi-channel cyber threat analytics

Douglas L. Schales , Mihai Christodorescu , Xin Hu , Jiyong Jang
information reuse and integration 8 -15

5
2014
Android Malware Clustering through Malicious Payload Mining

Yuping Li , Jiyong Jang , Xin Hu , Xinming Ou
recent advances in intrusion detection 192 -214

84
2017
Topology-Aware Hashing for Effective Control Flow Graph Similarity Analysis

Yuping Li , Jiyong Jang , Xinming Ou
international conference on security and privacy in communication systems 278 -298

6
2019
Threat Intelligence Computing

Xiaokui Shu , Frederico Araujo , Douglas L. Schales , Marc Ph. Stoecklin
computer and communications security 1883 -1898

46
2018
BotMeter: Charting DGA-Botnet Landscapes in Large Networks

Ting Wang , Xin Hu , Jiyong Jang , Shouling Ji
2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS) 334 -343

11
2016
MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation

Xin Hu , Ting Wang , Marc Ph Stoecklin , Douglas L Schales
EURASIP Journal on Information Security 2014 ( 1) 17

5
2014
FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics

Douglas L. Schales , Xin Hu , Jiyong Jang , Reiner Sailer
international conference on data engineering 1316 -1327

10
2015
Protecting Intellectual Property of Deep Neural Networks with Watermarking

Jialong Zhang , Zhongshu Gu , Jiyong Jang , Hui Wu
computer and communications security 159 -172

344
2018
BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks

Xin Hu , Jiyong Jang , Marc Ph. Stoecklin , Ting Wang
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 479 -490

29
2016
Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic

Jialong Zhang , Zhongshu Gu , Jiyong Jang , Dhilung Kirat
dependable systems and networks 76 -87

1
2020
Detecting Malicious Exploit Kits using Tree-based Similarity Searches

Teryl Taylor , Xin Hu , Ting Wang , Jiyong Jang
conference on data and application security and privacy 255 -266

19
2016
The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics

Bum Jun Kwon , Jayanta Mondal , Jiyong Jang , Leyla Bilge
computer and communications security 1118 -1129

75
2015