Loai Zomlot
Loai Zomlot
Microsoft
Verified email at ksu.edu - Homepage
Title
Cited by
Cited by
Year
The operational role of security information and event management systems
S Bhatt, PK Manadhata, L Zomlot
IEEE security & Privacy 12 (5), 35-41, 2014
1702014
Prioritizing intrusion analysis using Dempster-Shafer theory
L Zomlot, SC Sundaramurthy, K Luo, X Ou, SR Rajagopalan
Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011
652011
A tale of three security operation centers
SC Sundaramurthy, J Case, T Truong, L Zomlot, M Hoffmann
Proceedings of the 2014 ACM workshop on security information workers, 43-50, 2014
352014
Aiding Intrusion Analysis using Machine Learning
L Zomlot, SC Sundaramurthy, D Caragea, X Ou
12th International Conference on Machine Learning and Applications (ICMLA), 2013
252013
Practical IDS alert correlation in the face of dynamic threats
SC Sundaramurthy, L Zomlot, X Ou
Proceedings of the International Conference on Security and Management (SAM), 1, 2011
222011
Classification of UDP Traffic for DDoS Detection
AG Bardas, L Zomlot, S Chandran, X Ou, SR Rajagopalan, ...
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '12), 2012
92012
Propagating belief information about malicious and benign nodes
L Zomlot, PK Manadhata
US Patent App. 15/754,617, 2018
22018
The role of processes in security operations centers
S Bhatt, W Horne, S Sundaramurthy, L Zomlot
Psychosocial dynamics of cyber security, 86-103, 2016
12016
Handling uncertainty in intrusion analysis
L Zomlot
Kansas State University, 2014
12014
Practical IDS alert correlation in the face of dynamic threats
S CHANDRAN SUNDARAMURTHY, L ZOMLOT, X OU
SAM 2011: proceedings of the 2011 international conference on security …, 2011
2011
The system can't perform the operation now. Try again later.
Articles 1–10