A context-based detection framework for advanced persistent threats P Giura, W Wang 2012 International Conference on Cyber Security, 69-74, 2012 | 122 | 2012 |
Using large scale distributed computing to unveil advanced persistent threats P Giura, W Wang Science J 1 (3), 93-105, 2012 | 106 | 2012 |
Highly efficient techniques for network forensics M Ponec, P Giura, H Brönnimann, J Wein Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 49 | 2007 |
Mitigating sms spam by online detection of repetitive near-duplicate messages B Coskun, P Giura 2012 IEEE International Conference on Communications (ICC), 999-1004, 2012 | 40 | 2012 |
New payload attribution methods for network forensic investigations M Ponec, P Giura, J Wein, H Brönnimann ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-32, 2010 | 39 | 2010 |
Netstore: An efficient storage infrastructure for network forensics and monitoring P Giura, N Memon Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010 | 34 | 2010 |
Is it really you? User identification via adaptive behavior fingerprinting P Giura, I Murynets, R Piqueras Jover, Y Vahlis Proceedings of the 4th ACM conference on Data and application security and …, 2014 | 22 | 2014 |
Method and apparatus for ranking apps in the wide-open internet AG Forte, B Coskun, Q Shen, I Murynets, J Bickford, M Istomin, P Giura, ... US Patent App. 13/540,249, 2014 | 18 | 2014 |
Methods, systems, and computer program products for verifying user data access policies when server and/or user are not trusted E Vahlis, P Giura US Patent 9,171,174, 2015 | 13 | 2015 |
How vulnerabilities in wireless networks can enable Advanced Persistent Threats RP Jover, P Giura International Journal on Information Technology (IREIT) 1 (2), 145-151, 2013 | 13 | 2013 |
Methods of generating signatures from groups of electronic messages and related methods and systems for identifying spam messages P Giura, B Coskun US Patent 10,333,877, 2019 | 10 | 2019 |
Safe internet browsing using a transparent virtual browser J Bickford, P Giura 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015 | 7 | 2015 |
Method and apparatus for robust mobile application fingerprinting AG Forte, B Coskun, Q Shen, I Murynets, J Bickford, M Istomin, P Giura, ... US Patent App. 13/540,307, 2014 | 6 | 2014 |
Computation of historical data P Giura US Patent 10,129,212, 2018 | 5 | 2018 |
Verification service Q Shen, AG Forte, P Giura, M Istomin, E Vahlis, W Wang US Patent 8,739,247, 2014 | 4 | 2014 |
The security cost of content distribution network architectures P Giura, G De Los Reyes 2011 IEEE 35th Annual Computer Software and Applications Conference …, 2011 | 4 | 2011 |
Network protection from cyber attacks P Giura, JE Bickford, G De Los Reyes US Patent 10,530,808, 2020 | 3 | 2020 |
Detection of spam messages P Giura, B Coskun US Patent 11,095,586, 2021 | 2 | 2021 |
Enterprise server behavior profiling P Giura, S Nurilov, M Sankore, C Spielman US Patent 10,797,974, 2020 | 2 | 2020 |
Sapphire: using network gateways for IoT security P Giura, T Jim Proceedings of the 8th International Conference on the Internet of Things, 1-8, 2018 | 2 | 2018 |