关注
Sabyasachi Saha
Sabyasachi Saha
Principal Data Scientist
在 narus.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Detecting malicious endpoints using network connectivity and flow information
S Saha, L Liu, R Torres, J Xu, A Nucci
US Patent US8813236 B1, 2014
1972014
Class discovery for automated discovery, attribution, analysis, and risk assessment of security threats
A Nucci, PM Comar, S Saha, L Liu
US Patent 8,418,249, 2013
1892013
Nazca: Detecting Malware Distribution in Large-Scale Networks.
L Invernizzi, S Miskovic, R Torres, C Kruegel, S Saha, G Vigna, SJ Lee, ...
NDSS 14, 23-26, 2014
1872014
Combining supervised and unsupervised learning for zero-day malware detection
PM Comar, L Liu, S Saha, PN Tan, A Nucci
2013 Proceedings IEEE INFOCOM, 2022-2030, 2013
1442013
Systematic mining of associated server herds for uncovering malware and attack campaigns
J Zhang, S Saha, G Gu, SJ Lee, B Nardelli
US Patent 9,088,598, 2015
1222015
Detecting malicious http redirections using trees of user browsing activity
H Mekky, R Torres, ZL Zhang, S Saha, A Nucci
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1159-1167, 2014
842014
Modeling opponent decision in repeated one-shot negotiations
S Saha, A Biswas, S Sen
Proceedings of the fourth international joint conference on Autonomous …, 2005
772005
Automated discovery, attribution, analysis, and risk assessment of security threats
A Nucci, S Saha
US Patent 9,094,288, 2015
722015
Detecting malicious HTTP redirections using user browsing activity trees
R Torres, H Mekky, ZL Zhang, S Saha, A Nucci
US Patent 9,531,736, 2016
662016
Reciprocal resource sharing in P2P environments
D Banerjee, S Saha, S Sen, P Dasgupta
Proceedings of the fourth international joint conference on Autonomous …, 2005
592005
Detecting suspicious network behaviors based on domain name service failures
P Luo, R Torres, ZL Zhang, S Saha, SJ Lee, A Nucci
US Patent 9,245,121, 2016
532016
Detecting malware infestations in large-scale networks
L Invernizzi, S Miskovic, R Torres, S Saha, C Kruegel, A Nucci, SJ Lee, ...
US Patent 8,959,643, 2015
452015
An Efficient Protocol for Negotiation over Multiple Indivisible Resources.
S Saha, S Sen
IJCAI 7, 1494-1499, 2007
382007
Systematic mining of associated server herds for malware campaign discovery
J Zhang, S Saha, G Gu, SJ Lee, M Mellia
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
312015
Helping based on future expectations
S Saha, S Sen, PS Dutta
Proceedings of the Second International Joint Conference on Autonomous …, 2003
312003
YouLighter: A cognitive approach to unveil YouTube CDN and changes
D Giordano, S Traverso, L Grimaudo, M Mellia, E Baralis, A Tongaonkar, ...
IEEE Transactions on Cognitive Communications and Networking 1 (2), 161-174, 2015
292015
Detecting malicious clients in isp networks using http connectivity graph and flow information
L Liu, S Saha, R Torres, J Xu, PN Tan, A Nucci, M Mellia
2014 IEEE/ACM International Conference on Advances in Social Networks …, 2014
272014
MAGMA network behavior classifier for malware traffic
E Bocchi, L Grimaudo, M Mellia, E Baralis, S Saha, S Miskovic, ...
Computer Networks 109, 142-156, 2016
262016
Evolutionary tournament-based comparison of learning and non-learning algorithms for iterated games
S Airiau, S Saha, S Sen
Journal of Artificial Societies and Social Simulation 10 (3), 7, 2007
19*2007
Recursive nmf: Efficient label tree learning for large multi-class problems
L Liu, PM Comar, S Saha, PN Tan, A Nucci
Proceedings of the 21st International Conference on Pattern Recognition …, 2012
182012
系统目前无法执行此操作,请稍后再试。
文章 1–20