Passive security intelligence to analyze the security risks of mobile/BYOD activitiesMarc StoecklinKapil Singhet al.2016IBM J. Res. Dev
Uncovering insider threats from the digital footprints of individualsAnni CodenW.S. Linet al.2016IBM J. Res. Dev
Firstfilter: A cost-sensitive approach to malicious URL detection in large-scale enterprise networksLong VuP. Nguyenet al.2016IBM J. Res. Dev
A platform and analytics for usage and entitlement analyticsSuresh ChariT.A. Habecket al.2016IBM J. Res. Dev
Security 360°: Enterprise security for the cognitive eraJosyula R. RaoSuresh Chariet al.2016IBM J. Res. Dev
Scalable malware classification with multifaceted content features and threat intelligenceXin HuJiyong Janget al.2016IBM J. Res. Dev
Identifying malicious activities from system execution tracesEhud AharoniR. Peleget al.2016IBM J. Res. Dev
Scalable analytics to detect DNS misuse for establishing stealthy communication channelsDouglas L. SchalesJiyong Janget al.2016IBM J. Res. Dev
Security intelligence for cloud management infrastructuresS. BergerShelly Garionet al.2016IBM J. Res. Dev
Data classification and sensitivity estimation for critical asset discoveryYoungja ParkW. Teikenet al.2016IBM J. Res. Dev