Scan statistics for the online detection of locally anomalous subgraphs J Neil, C Hash, A Brugh, M Fisk, CB Storlie Technometrics 55 (4), 403-414, 2013 | 163 | 2013 |
Unified host and network data set MJM Turcotte, AD Kent, C Hash Data science for cyber-security, 1-22, 2019 | 160 | 2019 |
Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent US Patent 9,560,065, 2017 | 66 | 2017 |
Stochastic identification of malware with dynamic traces C Storlie, B Anderson, SV Wiel, D Quist, C Hash, N Brown The Annals of Applied Statistics, 1-18, 2014 | 28 | 2014 |
Path scanning for the detection of anomalous subgraphs and use of dns requests and host agents for anomaly/change detection and network situational awareness JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent US Patent App. 16/278,225, 2019 | 25 | 2019 |
Towards improved detection of attackers in computer networks: New edges, fast updating, and host agents J Neil, B Uphoff, C Hash, C Storlie 2013 6th International Symposium on Resilient Control Systems (ISRCS), 218-224, 2013 | 19 | 2013 |
Malware phylogenetics based on the multiview graphical lasso B Anderson, T Lane, C Hash Advances in Intelligent Data Analysis XIII: 13th International Symposium …, 2014 | 17 | 2014 |
Term distribution visualizations with focus+ context M Schwartz, C Hash, LM Liebrock Proceedings of the 2009 ACM symposium on Applied Computing, 1792-1799, 2009 | 14* | 2009 |
Statistical detection of intruders within computer networks using scan statistics J Neil, C Storlie, C Hash, A Brugh Data Analysis for Network Cyber-Security, 71-104, 2014 | 12 | 2014 |
Non-harmful insertion of data mimicking computer network attacks JC Neil, A Kent, CL Hash US Patent 9,374,380, 2016 | 11 | 2016 |
Joint Statistical Meetings J Neil, C Storlie, C Hash, A Brugh, M Fisk Vancouver, Canada (Aug. 4, 2010), 2010 | 11 | 2010 |
Advanced Computing Solutions, Statistical Sciences Group (CCS-6), Los Alamos National Laboratory J Neil, C Storlie, C Hash, A Brugh, M Fisk | 10 | |
Unified Host and Network Data Set.” arXiv e-prints MJM Turcotte, AD Kent, C Hash August, 2017 | 6 | 2017 |
Non-harmful insertion of data mimicking computer network attacks J Neil, A Kent, JR Curtis Hash, M Fisk, A Brugh, C Storlie, B Uphoff US Patent 10,122,741, 2018 | 4 | 2018 |
FileMap map-reduce program execution on loosely-coupled distributed systems ME Fisk, CL Hash Jr Proceedings of the Fourth International Workshop on Cloud Data and Platforms …, 2014 | 4 | 2014 |
Consideration of issues for parallel digital forensics of raid systems V Urias, C Hash, LM Liebrock Journal of Digital Forensic Practice 2 (4), 196-208, 2009 | 4 | 2009 |
Stochastic Identification and Clustering of Malware with Dynamic Traces CB Storlie, S Vander Wiel, D Quist, B Anderson, C Hash, N Brown Malware Technical Exchange Meeting 2012, 2012 | 3 | 2012 |
Term distribution visualizations with a focus+ context model M Schwartz, C Hash, L Liebrock Technical report, New Mexico Institute of Mining and Technology, 2008 | 1 | 2008 |
Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent US Patent 10,243,984, 2019 | | 2019 |
Authscan 2. x M Turcotte, N Heard, C Hash, A Brugh Los Alamos National Laboratory (LANL), Los Alamos, NM (United States), 2018 | | 2018 |