Fox in the trap: thwarting masqueraders via automated decoy document deployment J Voris, J Jermyn, N Boggs, S Stolfo Proceedings of the Eighth European Workshop on System Security, 3, 2015 | 52 | 2015 |
Lost in Translation: Improving Decoy Documents via Automated Translation J Voris, N Boggs, SJ Stolfo Security and Privacy Workshops (SPW), 2012 IEEE Symposium on, 129-133, 2012 | 50 | 2012 |
Cross-Domain collaborative anomaly detection: so far yet so close N Boggs, S Hiremagalore, A Stavrou, S Stolfo Recent Advances in Intrusion Detection, 142-160, 2011 | 45 | 2011 |
Methods, Systems and Media for Evaluating Layered Computer Security Products NG Boggs, SJ Stolfo US Patent App. 14/083,327, 2013 | 38* | 2013 |
Synthetic Data Generation and Defense in Depth Measurement of Web Applications N Boggs, H Zhao, S Du, SJ Stolfo Research in Attacks, Intrusions and Defenses, 234-254, 2014 | 27 | 2014 |
Methods, systems, and computer program products for detecting communication anomalies in a network based on overlap between sets of users communicating with entities in the network N Boggs, W Wang, B Coskun, S Mathur US Patent 9,203,856, 2015 | 20 | 2015 |
Utilizing electromagnetic emanations for out-of-band detection of unknown attack code in a programmable logic controller N Boggs, JC Chau, A Cui Cyber Sensing 2018 10630, 106300D, 2018 | 18 | 2018 |
Model Aggregation for Distributed Content Anomaly Detection S Whalen, N Boggs, SJ Stolfo Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014 | 16 | 2014 |
Measuring Drive-by Download Defense in Depth N Boggs, S Du, SJ Stolfo Research in Attacks, Intrusions and Defenses, 172-191, 2014 | 16 | 2014 |
Discovery of emergent malicious campaigns in cellular networks N Boggs, W Wang, S Mathur, B Coskun, C Pincock Proceedings of the 29th Annual Computer Security Applications Conference, 29-38, 2013 | 16 | 2013 |
Methods, systems, and computer program products for detecting communication anomalies in a network based on overlap between sets of users communicating with entities in the network N Boggs, W Wang, B Coskun, S Mathur US Patent 9,641,545, 2017 | 13 | 2017 |
Aldr: A new metric for measuring effective layering of defenses N Boggs, S Stolfo Fifth Layered Assurance Workshop (LAW 2011), Orlando, Florida, 2011 | 7 | 2011 |
Experimental results of cross-site exchange of web content Anomaly Detector alerts N Boggs, S Hiremagalore, A Stavrou, SJ Stolfo Technologies for Homeland Security (HST), 2010 IEEE International Conference …, 2010 | 7 | 2010 |
Methods, systems and media for evaluating layered computer security products NG Boggs, SJ Stolfo US Patent 10,594,722, 2020 | 6 | 2020 |
Remote attestation of host-based defense via optical channel N Boggs, B So, A Cui Cyber Sensing 2020 11417, 1141705, 2020 | | 2020 |
Empirical Measurement of Defense in Depth N Boggs Columbia University, 2015 | | 2015 |