Sabyasachi Saha
Sabyasachi Saha
Principal Data Scientist
Verified email at narus.com - Homepage
Title
Cited by
Cited by
Year
Nazca: Detecting Malware Distribution in Large-Scale Networks.
L Invernizzi, S Miskovic, R Torres, C Kruegel, S Saha, G Vigna, SJ Lee, ...
NDSS 14, 23-26, 2014
1242014
Class discovery for automated discovery, attribution, analysis, and risk assessment of security threats
A Nucci, PM Comar, S Saha, L Liu
US Patent 8,418,249, 2013
1032013
Detecting malicious endpoints using network connectivity and flow information
S Saha, L Liu, R Torres, J Xu, A Nucci
US Patent US8813236 B1, 2014
992014
Combining supervised and unsupervised learning for zero-day malware detection
PM Comar, L Liu, S Saha, PN Tan, A Nucci
2013 Proceedings IEEE INFOCOM, 2022-2030, 2013
792013
Modeling opponent decision in repeated one-shot negotiations
S Saha, A Biswas, S Sen
Proceedings of the fourth international joint conference on Autonomous …, 2005
682005
Systematic mining of associated server herds for uncovering malware and attack campaigns
J Zhang, S Saha, G Gu, SJ Lee, B Nardelli
US Patent 9,088,598, 2015
562015
Reciprocal resource sharing in P2P environments
D Banerjee, S Saha, S Sen, P Dasgupta
Proceedings of the fourth international joint conference on Autonomous …, 2005
562005
Detecting malicious http redirections using trees of user browsing activity
H Mekky, R Torres, ZL Zhang, S Saha, A Nucci
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1159-1167, 2014
552014
An Efficient Protocol for Negotiation over Multiple Indivisible Resources.
S Saha, S Sen
IJCAI 7, 1494-1499, 2007
352007
Helping based on future expectations
S Saha, S Sen, PS Dutta
Proceedings of the second international joint conference on Autonomous …, 2003
312003
Detecting suspicious network behaviors based on domain name service failures
P Luo, R Torres, ZL Zhang, S Saha, SJ Lee, A Nucci
US Patent 9,245,121, 2016
292016
Systematic mining of associated server herds for malware campaign discovery
J Zhang, S Saha, G Gu, SJ Lee, M Mellia
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
252015
Detecting malicious clients in isp networks using http connectivity graph and flow information
L Liu, S Saha, R Torres, J Xu, PN Tan, A Nucci, M Mellia
2014 IEEE/ACM International Conference on Advances in Social Networks …, 2014
202014
Automated discovery, attribution, analysis, and risk assessment of security threats
A Nucci, S Saha
US Patent 9,094,288, 2015
192015
Detecting malware infestations in large-scale networks
L Invernizzi, S Miskovic, R Torres, S Saha, C Kruegel, A Nucci, SJ Lee, ...
US Patent 8,959,643, 2015
192015
Evolutionary tournament-based comparison of learning and non-learning algorithms for iterated games
S Airiau, S Saha, S Sen
Journal of Artificial Societies and Social Simulation 10 (3), 7, 2007
182007
MAGMA network behavior classifier for malware traffic
E Bocchi, L Grimaudo, M Mellia, E Baralis, S Saha, S Miskovic, ...
Computer Networks 109, 142-156, 2016
172016
Recursive nmf: Efficient label tree learning for large multi-class problems
L Liu, PM Comar, S Saha, PN Tan, A Nucci
Proceedings of the 21st International Conference on Pattern Recognition …, 2012
162012
A Bayes net approach to argumentation based negotiation
S Saha, S Sen
International Workshop on Argumentation in Multi-Agent Systems, 208-222, 2004
152004
YouLighter: A cognitive approach to unveil YouTube CDN and changes
D Giordano, S Traverso, L Grimaudo, M Mellia, E Baralis, A Tongaonkar, ...
IEEE Transactions on Cognitive Communications and Networking 1 (2), 161-174, 2015
142015
The system can't perform the operation now. Try again later.
Articles 1–20