Follow
Curtis Hash
Curtis Hash
LANL / EY
Verified email at lanl.gov - Homepage
Title
Cited by
Cited by
Year
Scan statistics for the online detection of locally anomalous subgraphs
J Neil, C Hash, A Brugh, M Fisk, CB Storlie
Technometrics 55 (4), 403-414, 2013
1632013
Unified host and network data set
MJM Turcotte, AD Kent, C Hash
Data science for cyber-security, 1-22, 2019
1602019
Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness
JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent
US Patent 9,560,065, 2017
662017
Stochastic identification of malware with dynamic traces
C Storlie, B Anderson, SV Wiel, D Quist, C Hash, N Brown
The Annals of Applied Statistics, 1-18, 2014
282014
Path scanning for the detection of anomalous subgraphs and use of dns requests and host agents for anomaly/change detection and network situational awareness
JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent
US Patent App. 16/278,225, 2019
252019
Towards improved detection of attackers in computer networks: New edges, fast updating, and host agents
J Neil, B Uphoff, C Hash, C Storlie
2013 6th International Symposium on Resilient Control Systems (ISRCS), 218-224, 2013
192013
Malware phylogenetics based on the multiview graphical lasso
B Anderson, T Lane, C Hash
Advances in Intelligent Data Analysis XIII: 13th International Symposium …, 2014
172014
Term distribution visualizations with focus+ context
M Schwartz, C Hash, LM Liebrock
Proceedings of the 2009 ACM symposium on Applied Computing, 1792-1799, 2009
14*2009
Statistical detection of intruders within computer networks using scan statistics
J Neil, C Storlie, C Hash, A Brugh
Data Analysis for Network Cyber-Security, 71-104, 2014
122014
Non-harmful insertion of data mimicking computer network attacks
JC Neil, A Kent, CL Hash
US Patent 9,374,380, 2016
112016
Joint Statistical Meetings
J Neil, C Storlie, C Hash, A Brugh, M Fisk
Vancouver, Canada (Aug. 4, 2010), 2010
112010
Advanced Computing Solutions, Statistical Sciences Group (CCS-6), Los Alamos National Laboratory
J Neil, C Storlie, C Hash, A Brugh, M Fisk
10
Unified Host and Network Data Set.” arXiv e-prints
MJM Turcotte, AD Kent, C Hash
August, 2017
62017
Non-harmful insertion of data mimicking computer network attacks
J Neil, A Kent, JR Curtis Hash, M Fisk, A Brugh, C Storlie, B Uphoff
US Patent 10,122,741, 2018
42018
FileMap map-reduce program execution on loosely-coupled distributed systems
ME Fisk, CL Hash Jr
Proceedings of the Fourth International Workshop on Cloud Data and Platforms …, 2014
42014
Consideration of issues for parallel digital forensics of raid systems
V Urias, C Hash, LM Liebrock
Journal of Digital Forensic Practice 2 (4), 196-208, 2009
42009
Stochastic Identification and Clustering of Malware with Dynamic Traces
CB Storlie, S Vander Wiel, D Quist, B Anderson, C Hash, N Brown
Malware Technical Exchange Meeting 2012, 2012
32012
Term distribution visualizations with a focus+ context model
M Schwartz, C Hash, L Liebrock
Technical report, New Mexico Institute of Mining and Technology, 2008
12008
Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness
JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent
US Patent 10,243,984, 2019
2019
Authscan 2. x
M Turcotte, N Heard, C Hash, A Brugh
Los Alamos National Laboratory (LANL), Los Alamos, NM (United States), 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20