Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibilityS. BergerY. Chenet al.2016IBM J. Res. Dev
Passive security intelligence to analyze the security risks of mobile/BYOD activitiesMarc StoecklinKapil Singhet al.2016IBM J. Res. Dev
Security 360°: Enterprise security for the cognitive eraJosyula R. RaoSuresh Chariet al.2016IBM J. Res. Dev
Detecting malicious exploit kits using tree-based similarity searchesTeryl TaylorXin Huet al.2016CODASPY 2016
FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analyticsDouglas L. SchalesXin Huet al.2015ICDE 2015
Asset risk scoring in enterprise network with mutually reinforced reputation propagationXin HuTing Wanget al.2014S&P 2014
Kaleido: Network traffic attribution using multifaceted footprintingTing WangFei Wanget al.2014SDM 2014
Outsourcing multi-version key-value stores with verifiable data freshnessYuzhe TangLing Liuet al.2014ICDE 2014
Stream computing for large-scale, multi-channel cyber threat analyticsDouglas L. SchalesMihai Christodorescuet al.2014IRI 2014