Scalable analytics to detect DNS misuse for establishing stealthy communication channelsDouglas L. SchalesJiyong Janget al.2016IBM J. Res. Dev
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibilityS. BergerY. Chenet al.2016IBM J. Res. Dev
Data classification and sensitivity estimation for critical asset discoveryYoungja ParkW. Teikenet al.2016IBM J. Res. Dev
Uncovering insider threats from the digital footprints of individualsAnni CodenW.S. Linet al.2016IBM J. Res. Dev
Security 360°: Enterprise security for the cognitive eraJosyula R. RaoSuresh Chariet al.2016IBM J. Res. Dev
Identifying malicious activities from system execution tracesEhud AharoniR. Peleget al.2016IBM J. Res. Dev
Firstfilter: A cost-sensitive approach to malicious URL detection in large-scale enterprise networksLong VuP. Nguyenet al.2016IBM J. Res. Dev
Scalable malware classification with multifaceted content features and threat intelligenceXin HuJiyong Janget al.2016IBM J. Res. Dev
Security intelligence for cloud management infrastructuresS. BergerShelly Garionet al.2016IBM J. Res. Dev