Rich Harang
Rich Harang
Sophos
Bestätigte E-Mail-Adresse bei sophos.com
Titel
Zitiert von
Zitiert von
Jahr
Crafting adversarial input sequences for recurrent neural networks
N Papernot, P McDaniel, A Swami, R Harang
MILCOM 2016-2016 IEEE Military Communications Conference, 49-54, 2016
1602016
De-anonymizing programmers via code stylometry
A Caliskan-Islam, R Harang, A Liu, A Narayanan, C Voss, F Yamaguchi, ...
24th {USENIX} Security Symposium ({USENIX} Security 15), 255-270, 2015
1362015
A neuropeptide speeds circadian entrainment by reducing intercellular synchrony
S An, R Harang, K Meeker, D Granados-Fuentes, CA Tsai, C Mazuski, ...
Proceedings of the National Academy of Sciences 110 (46), E4355-E4361, 2013
1082013
When coding style survives compilation: De-anonymizing programmers from executable binaries
A Caliskan, F Yamaguchi, E Dauber, R Harang, K Rieck, R Greenstadt, ...
arXiv preprint arXiv:1512.08546, 2015
762015
WAVOS: a MATLAB toolkit for wavelet analysis and visualization of oscillatory systems
R Harang, G Bonnet, LR Petzold
BMC research notes 5 (1), 1-8, 2012
392012
Rapid permissions-based detection and analysis of mobile malware using random decision forests
W Glodek, R Harang
MILCOM 2013-2013 IEEE Military Communications Conference, 980-985, 2013
372013
Wavelet Measurement Suggests Cause of Period Instability in Mammalian Circadian Neurons
K Meeker, R Harang, AB Webb, DK Welsh, FJ Doyle, G Bonnet, ...
Journal of Biological Rhythms 26 (4), 353-362, 2011
292011
Source code authorship attribution using long short-term memory based networks
B Alsulami, E Dauber, R Harang, S Mancoridis, R Greenstadt
European Symposium on Research in Computer Security, 65-82, 2017
282017
A deep learning approach to fast, format-agnostic detection of malicious web content
J Saxe, R Harang, C Wild, H Sanders
2018 IEEE Security and Privacy Workshops (SPW), 8-14, 2018
162018
Git blame who?: Stylistic authorship attribution of small, incomplete source code fragments
E Dauber, A Caliskan, R Harang, G Shearer, M Weisman, F Nelson, ...
Proceedings on Privacy Enhancing Technologies 2019 (3), 389-408, 2019
152019
Statistical models for the number of successful cyber intrusions
NO Leslie, RE Harang, LP Knachel, A Kott
The Journal of Defense Modeling and Simulation 15 (1), 49-63, 2018
152018
Extremely lightweight intrusion detection (ELIDe)
RJ Chang, RE Harang, GS Payer
ARMY RESEARCH LAB ADELPHI MD COMPUTATIONAL AND INFORMATION SCIENCES DIRECTORATE, 2013
132013
Burstiness of intrusion detection process: Empirical evidence and a modeling approach
R Harang, A Kott
IEEE Transactions on Information Forensics and Security 12 (10), 2348-2359, 2017
122017
Clustering of Snort alerts to identify patterns and reduce analyst workload
R Harang, P Guarino
MILITARY COMMUNICATIONS CONFERENCE, 2012-MILCOM 2012, 1-6, 2012
122012
A fast kernel for attributed graphs
Y Su, F Han, RE Harang, X Yan
Proceedings of the 2016 SIAM international conference on data mining, 486-494, 2016
112016
Meade: Towards a malicious email attachment detection engine
EM Rudd, R Harang, J Saxe
2018 IEEE International Symposium on Technologies for Homeland Security (HST …, 2018
102018
Identifying key cyber-physical terrain
B Thompson, R Harang
Proceedings of the 3rd ACM on International Workshop on Security And Privacy …, 2017
8*2017
Bridging the semantic gap: Human factors in anomaly-based intrusion detection systems
R Harang
Network Science and Cybersecurity, 15-37, 2014
82014
Poster: Git blame who?: Stylistic authorship attribution of small, incomplete source code fragments
E Dauber, A Caliskan, R Harang, R Greenstadt
2018 IEEE/ACM 40th International Conference on Software Engineering …, 2018
72018
A framework to evaluate cyber agility
LM Marvel, S Brown, I Neamtiu, R Harang, D Harman, B Henz
MILCOM 2015-2015 IEEE Military Communications Conference, 31-36, 2015
72015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20