Publications
Band to Band Hopping in One-Dimensional Maps.
Journal of Physics A: Mathematical and General. 14(2), L23-26.
(1981). Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels.
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. 45–56.
(2015). Blind Non-Intrusive Speech Intelligibility Prediction Using Twin-HMMs.
Proceedings of Interspeech 2016.
(2016). Bounded branching process and AND/OR tree evaluation.
Random Structures and Algorithms. 7(2), 97-116.
(1995). The bit vector intersection problem.
Proceedings of the 36th Annual Symposium on Foundations of Computer Science (FOCS'95). 621-630.
(1995).
(1989). Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic.
Proceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005). 267-272.
(2005). Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity.
Proceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX). 109-118.
(2005).
(2010).
(2014).
(2007).
BRITE: An Approach to Universal Topology Generation.
Proceedings of MASCOTS 2001.
(2001).
(2000).
(2001). Back to the Future: Malware Detection with Temporally Consistent Labels.
CoRR. abs/1510.07338,
(2015).
(2006). Big Dumb Neural Nets: A Working Brute Force Approach to Speech Recognition.
Proceedings of the International Conference on Neural Networks. VII, 4462-4465.
(1994). Bertha: Tunneling through the Network API.
HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in Networks. 53-59.
(2020).
(1991).
(1992).
(2003).
binpac: A yacc for Writing Application Protocol Parsers.
Proceedings of the Internet Measurement Conference 2006 (IMC 2006). 289-300.
(2006).
(2013). Bro: A System for Detecting Network Intruders in Real-Time.
Proceedings of the 7th USENIX Security Symposium.
(1998).
(1999).