팔로우
Teryl Taylor
Teryl Taylor
Research Staff Member, IBM Research
ibm.com의 이메일 확인됨
제목
인용
인용
연도
Flovis: Flow visualization system
T Taylor, D Paterson, J Glanfield, C Gates, S Brooks, J McHugh
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
852009
Methods, systems, and computer readable media for detecting malicious network traffic
TP Taylor, KZ Snow, NM Otterness, FN Monrose
US Patent 9,992,217, 2018
642018
Detecting web exploit kits by tree-based structural similarity search
X Hu, J Jang, F Monrose, MP Stoecklin, T Taylor, T Wang
US Patent 9,723,016, 2017
542017
Detecting malicious exploit kits using tree-based similarity searches
T Taylor, X Hu, T Wang, J Jang, MP Stoecklin, F Monrose, R Sailer
proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
442016
Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing
S Krishnan, T Taylor, F Monrose, J McHugh
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
442013
NetBytes viewer: An entity-based netflow visualization utility for identifying intrusive behavior
T Taylor, S Brooks, J McHugh
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer …, 2008
392008
Over flow: An overview visualization for network analysis
J Glanfield, S Brooks, T Taylor, D Paterson, C Smith, C Gates, J McHugh
2009 6th International Workshop on Visualization for Cyber Security, 11-19, 2009
312009
BotMeter: Charting DGA-botnet landscapes in large networks
T Wang, X Hu, J Jang, S Ji, M Stoecklin, T Taylor
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
252016
Defending against model inversion attacks on neural networks
F Araujo, J Zhang, T Taylor, MP Stoecklin
US Patent 10,733,292, 2020
242020
Methods, systems, and computer readable media for detecting a compromised computing host
F Monrose, T Taylor, S Krishnan, J McHugh
US Patent 9,934,379, 2018
232018
Cyber-deception using network port projection
F Araujo, DL Schales, MP Stoecklin, TP Taylor
US Patent 10,979,453, 2021
212021
Improving cybersecurity hygiene through JIT patching
F Araujo, T Taylor
Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020
192020
Detecting web exploit kits by tree-based structural similarity search
X Hu, J Jang, F Monrose, MP Stoecklin, T Taylor, T Wang
US Patent 9,516,051, 2016
182016
Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire.
T Taylor, KZ Snow, N Otterness, F Monrose
NDSS, 2016
172016
Application-level sandboxing
F Araujo, DL Schales, MP Stoecklin, TP Taylor
US Patent 10,887,346, 2021
162021
On-demand injection of software booby traps in live processes
F Araujo, DL Schales, MP Stoecklin, TP Taylor
US Patent 10,498,763, 2019
162019
Detecting adversarial attacks through decoy training
J Zhang, F Araujo, T Taylor, MP Stoecklin
US Patent 11,501,156, 2022
152022
Identification and extraction of key forensics indicators of compromise using subject-specific filesystem views
F Araujo, AE Kohlbrenner, MP Stoecklin, TP Taylor
US Patent 11,775,638, 2023
142023
Cross-stack threat sensing for cyber security and resilience
F Araujo, T Taylor, J Zhang, M Stoecklin
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
102018
Hidden in plain sight: Filesystem view separation for data integrity and deception
T Taylor, F Araujo, A Kohlbrenner, MP Stoecklin
Detection of Intrusions and Malware, and Vulnerability Assessment: 15th …, 2018
102018
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20