From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation F Araujo, KW Hamlen, S Biedermann, S Katzenbeisser 21st ACM Conference on Computer and Communications Security (CCS’14), 2014 | 147 | 2014 |
Threat intelligence computing X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang, H Huang, JR Rao Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 71 | 2018 |
DIVAs 4.0: A multi-agent based simulation framework M Al-Zinati, F Araujo, D Kuiper, J Valente, RZ Wenkstern 2013 IEEE/ACM 17th International Symposium on Distributed Simulation and …, 2013 | 34 | 2013 |
Compiler-instrumented, Dynamic {Secret-Redaction} of Legacy Processes for Attacker Deception F Araujo, W Kevin 24th USENIX Security Symposium (USENIX Security 15), 145-159, 2015 | 26 | 2015 |
Unsupervised Deep Embedding for Novel Class Detection over Data Stream A Mustafa, G Ayoade, K Al-Naami, L Khan, K Hamlen, B Thuraisingham, ... Proceedings of the IEEE International Conference on BigData, 2017 | 25 | 2017 |
Defending against model inversion attacks on neural networks F Araujo, J Zhang, T Taylor, MP Stoecklin US Patent 10,733,292, 2020 | 24 | 2020 |
Cyber-deception using network port projection F Araujo, DL Schales, MP Stoecklin, TP Taylor US Patent 10,979,453, 2021 | 21 | 2021 |
Experiences with Honey-Patching in Active Cyber Security Education F Araujo, M Shapouri, S Pandey, KW Hamlen 8th Workshop on Cyber Security Experimentation and Test, 2015 | 20 | 2015 |
Improving cybersecurity hygiene through JIT patching F Araujo, T Taylor Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020 | 19 | 2020 |
Application-level sandboxing F Araujo, DL Schales, MP Stoecklin, TP Taylor US Patent 10,887,346, 2021 | 16 | 2021 |
Automating Cyberdeception Evaluation with Deep Learning. G Ayoade, F Araujo, K Al-Naami, AM Mustafa, Y Gao, KW Hamlen, L Khan HICSS 3, 1-10, 2020 | 16 | 2020 |
On-demand injection of software booby traps in live processes F Araujo, DL Schales, MP Stoecklin, TP Taylor US Patent 10,498,763, 2019 | 16 | 2019 |
Detecting adversarial attacks through decoy training J Zhang, F Araujo, T Taylor, MP Stoecklin US Patent 11,501,156, 2022 | 15 | 2022 |
Iterative constraint solving in abstract graph matching for cyber incident reasoning X Shu, DL Schales, MP Stoecklin, F Araujo US Patent 11,941,054, 2024 | 14 | 2024 |
Identification and extraction of key forensics indicators of compromise using subject-specific filesystem views F Araujo, AE Kohlbrenner, MP Stoecklin, TP Taylor US Patent 11,775,638, 2023 | 14 | 2023 |
Improving intrusion detectors by crook-sourcing F Araujo, G Ayoade, K Al-Naami, Y Gao, KW Hamlen, L Khan Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 13 | 2019 |
Divas 4.0: A framework for the development of situated multi-agent based simulation systems F Araujo, J Valente, M Al-Zinati, D Kuiper, R Zalila-Wenkstern Proceedings of the 2013 international conference on Autonomous agents and …, 2013 | 11 | 2013 |
Cross-stack threat sensing for cyber security and resilience F Araujo, T Taylor, J Zhang, M Stoecklin 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018 | 10 | 2018 |
Hidden in plain sight: Filesystem view separation for data integrity and deception T Taylor, F Araujo, A Kohlbrenner, MP Stoecklin Detection of Intrusions and Malware, and Vulnerability Assessment: 15th …, 2018 | 10 | 2018 |
Dressed up: Baiting attackers through endpoint service projection MP Stoecklin, J Zhang, F Araujo, T Taylor Proceedings of the 2018 ACM International Workshop on Security in Software …, 2018 | 9 | 2018 |