Cloudy with a chance of breach: Forecasting cyber security incidents Y Liu, A Sarabi, J Zhang, P Naghizadeh, M Karir, M Bailey, M Liu 24th USENIX Security Symposium (USENIX Security 15), 1009-1024, 2015 | 248 | 2015 |
Measuring ipv6 adoption J Czyz, M Allman, J Zhang, S Iekel-Johnson, E Osterweil, M Bailey ACM SIGCOMM Computer Communication Review 44 (4), 87-98, 2015 | 202 | 2015 |
Rating network security posture and comparing network maliciousness M Liu, M Bailey, M Karir, Y Liu, J Zhang US Patent App. 14/801,016, 2015 | 137 | 2015 |
On the Mismanagement and Maliciousness of Networks J Zhang, Z Durumeric, M Bailey, M Liu, M Karir In Proceedings of the 21st Annual Network & Distributed System Security …, 2014 | 83 | 2014 |
Predicting Cyber Security Incidents Using Feature-Based Characterization of Network-Level Malicious Activities Y Liu, J Zhang, A Sarabi, M Liu, M Karir, M Bailey Proceedings of the 2015 ACM International Workshop on International Workshop …, 2015 | 52 | 2015 |
Network maliciousness susceptibility analysis and rating M Liu, M Bailey, M Karir, J Zhang, Z Durumeric US Patent App. 14/627,736, 2015 | 24 | 2015 |
Characterization of blacklists and tainted network traffic J Zhang, A Chivukula, M Bailey, M Karir, M Liu International Conference on Passive and Active Network Measurement, 218-228, 2013 | 23 | 2013 |
Safeguarding academic accounts and resources with the university credential abuse auditing system J Zhang, R Berthier, W Rhee, M Bailey, P Pal, F Jahanian, WH Sanders IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012 | 20 | 2012 |
Assessing IPv6 adoption J Czyz, M Allman, S Iekel-Johnson, E Osterweil, M Bailey International Computer Science Institute, Tec. Report TR-13-004, 2013 | 9 | 2013 |
Learning from early attempts to measure information security performance J Zhang, R Berthier, W Rhee, M Bailey, P Pal, F Jahanian, WH Sanders Proceedings of the 5th Workshop on Cyber Security Experimentation and Test …, 2012 | 6 | 2012 |