A human capital model for mitigating security analyst burnout SC Sundaramurthy, AG Bardas, J Case, X Ou, M Wesch, J McHugh, ... Eleventh symposium on usable privacy and security (SOUPS 2015), 347-359, 2015 | 118 | 2015 |
Experimental study of fuzzy hashing in malware clustering analysis Y Li, SC Sundaramurthy, AG Bardas, X Ou, D Caragea, X Hu, J Jang 8th workshop on cyber security experimentation and test (cset 15), 2015 | 101 | 2015 |
Turning contradictions into innovations or: How we learned to stop whining and improve security operations SC Sundaramurthy, J McHugh, X Ou, M Wesch, AG Bardas, ... Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 237-251, 2016 | 87 | 2016 |
Prioritizing intrusion analysis using Dempster-Shafer theory L Zomlot, SC Sundaramurthy, K Luo, X Ou, SR Rajagopalan Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011 | 70 | 2011 |
A tale of three security operation centers SC Sundaramurthy, J Case, T Truong, L Zomlot, M Hoffmann Proceedings of the 2014 ACM workshop on security information workers, 43-50, 2014 | 68 | 2014 |
An anthropological approach to studying CSIRTs SC Sundaramurthy, J McHugh, XS Ou, SR Rajagopalan, M Wesch IEEE Security & Privacy 12 (5), 52-60, 2014 | 53 | 2014 |
MTD CBITS: Moving target defense for cloud-based IT systems AG Bardas, SC Sundaramurthy, X Ou, SA DeLoach Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 32 | 2017 |
Aiding intrusion analysis using machine learning L Zomlot, S Chandran, D Caragea, X Ou 2013 12th International Conference on Machine Learning and Applications 2, 40-47, 2013 | 29 | 2013 |
Practical IDS alert correlation in the face of dynamic threats SC Sundaramurthy, L Zomlot, X Ou Proceedings of the International Conference on Security and Management (SAM), 1, 2011 | 26 | 2011 |
Humans are dynamic-our tools should be too SC Sundaramurthy, M Wesch, X Ou, J McHugh, SR Rajagopalan, ... IEEE Internet Computing 21 (3), 40-46, 2017 | 21 | 2017 |
Classification of UDP Traffic for DDoS Detection. AG Bardas, L Zomlot, SC Sundaramurthy, X Ou, SR Rajagopalan, ... LEET, 2012 | 14 | 2012 |
Deploying android security updates: an extensive study involving manufacturers, carriers, and end users KR Jones, TF Yen, SC Sundaramurthy, AG Bardas Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 12 | 2020 |
Humans are dynamic. Our tools should be too. Innovations from the Anthropological Study of Security Operations Centers SC Sundaramurthy, M Wesch, X Ou, J McHugh, SR Rajagopalan, ... IEEE Internet Computing, 2017 | 9 | 2017 |
Examining intrusion prevention system events from worldwide networks SC Sundaramurthy, S Bhatt, MR Eisenbarth Proceedings of the 2012 ACM workshop on building analysis datasets and …, 2012 | 5 | 2012 |
An anthropological study of security operations centers to improve operational efficiency SC Sundaramurthy University of South Florida, 2017 | 4 | 2017 |
An empirical study on current models for reasoning about digital evidence S Nagy, I Palmer, SC Sundaramurthy, X Ou, R Campbell 10th International Conference on Systematic Approaches to Digital Forensic …, 2015 | 3 | 2015 |
Designing forensic analysis techniques through anthropology SC Sundaramurthy Proceedings of the 2013 New Security Paradigms Workshop, 119-120, 2013 | 3 | 2013 |
Examining Intrusion Prevention System Events from Worldwide Networks SS Chandran, B Sandeep, RM Eisenbarth BADGERS’12, 2012 | 3 | 2012 |
The role of processes in security operations centers S Bhatt, W Horne, S Sundaramurthy, L Zomlot Psychosocial dynamics of cyber security, 86-103, 2016 | 1 | 2016 |
Investigative response modeling and predictive data collection D Moor, SR Rajagopalan, SC Sundaramurthy, X Ou 2012 eCrime Researchers Summit, 1-6, 2012 | | 2012 |