1. Brandie Anderson Sue Barsamian Dustin Childs Jason Ding Joy Marie Forsythe Brian Gorenc Angela Gunn Alexander Hoole Howard Miller Sasi Siddharth Muthurajan Yekaterina Tsipenyuk O’Neil John Park Oleg Petrovsky Barak Raz Nidhi Shah Vanja Svajcer Ken Tietjen and Jewel Timpe. 2016. Cyber Risk Report 2016. Technical Report. Hewlett Packard Enterprise. Brandie Anderson Sue Barsamian Dustin Childs Jason Ding Joy Marie Forsythe Brian Gorenc Angela Gunn Alexander Hoole Howard Miller Sasi Siddharth Muthurajan Yekaterina Tsipenyuk O’Neil John Park Oleg Petrovsky Barak Raz Nidhi Shah Vanja Svajcer Ken Tietjen and Jewel Timpe. 2016. Cyber Risk Report 2016. Technical Report. Hewlett Packard Enterprise.
2. Exploiting N-Gram Location for Intrusion Detection
3. Fabrizio Angiulli Luciano Argento and Angelo Furfaro. 2017. PCkAD source code. Retrieved from https://github.com/F3nDis/PCkAD. Fabrizio Angiulli Luciano Argento and Angelo Furfaro. 2017. PCkAD source code. Retrieved from https://github.com/F3nDis/PCkAD.
4. A Naive Bayes Approach for Detecting Coordinated Attacks
5. One-and-a-Half-Class Multiple Classifier Systems for Secure Learning Against Evasion Attacks at Test Time