1. Sebastian Abt and Harald Baier. 2014. Are we missing labels? A study of the availability of ground-truth in network security research. In 2014 third international workshop on building analysis datasets and gathering experience returns for security (badgers). IEEE 40–55. Sebastian Abt and Harald Baier. 2014. Are we missing labels? A study of the availability of ground-truth in network security research. In 2014 third international workshop on building analysis datasets and gathering experience returns for security (badgers). IEEE 40–55.
2. Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection
3. Bushra A Alahmadi , Louise Axon , and Ivan Martinovic . 2022 . 99% False Positives: A Qualitative Study of { SOC} Analysts’ Perspectives on Security Alarms. In 31st USENIX Security Symposium (USENIX Security 22) . 2783–2800. Bushra A Alahmadi, Louise Axon, and Ivan Martinovic. 2022. 99% False Positives: A Qualitative Study of { SOC} Analysts’ Perspectives on Security Alarms. In 31st USENIX Security Symposium (USENIX Security 22). 2783–2800.
4. Identifying malicious hosts involved in periodic communications
5. Ionut Arghire. 2022. QBot Malware Infects Over 800 Corporate Users in New Ongoing Campaign. https://www.securityweek.com/qbot-malware-infects-over-800-corporate-users-new-ongoing-campaign/. Ionut Arghire. 2022. QBot Malware Infects Over 800 Corporate Users in New Ongoing Campaign. https://www.securityweek.com/qbot-malware-infects-over-800-corporate-users-new-ongoing-campaign/.