Folgen
Kevin Alejandro Roundy
Kevin Alejandro Roundy
Norton Labs - Previously known as Symantec Research Labs
Bestätigte E-Mail-Adresse bei nortonlifelock.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Hybrid analysis and control of malware
KA Roundy, BP Miller
Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010
3022010
Guilt by association: large scale malware detection by mining file-relation graphs
A Tamersoy, K Roundy, DH Chau
Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014
2042014
Binary-code obfuscations in prevalent packer tools
KA Roundy, BP Miller
ACM Computing Surveys (CSUR) 46 (1), 1-32, 2013
1642013
Systems and methods for using event-correlation graphs to generate remediation procedures
KA Roundy, S Bhatkar
US Patent 9,256,739, 2016
942016
Systems and methods for detecting security threats based on user profiles
F Guo, S Bhatkar, K Roundy
US Patent 9,401,925, 2016
822016
Systems and methods for using event-correlation graphs to detect attacks on computing systems
K Roundy, F Guo, S Bhatkar, T Cheng, J Fu, ZK Li, D Shou, S Sawhney, ...
US Patent 9,141,790, 2015
802015
Systems and methods for classifying security events as targeted attacks
KA Roundy, S Bhatkar
US Patent 9,754,106, 2017
782017
VIGOR: interactive visual exploration of graph query results
R Pienta, F Hohman, A Endert, A Tamersoy, K Roundy, C Gates, ...
IEEE transactions on visualization and computer graphics 24 (1), 215-225, 2017
692017
Large-scale identification of malicious singleton files
B Li, K Roundy, C Gates, Y Vorobeychik
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
682017
Systems and methods for reducing false positives when using event-correlation graphs to detect attacks on computing systems
F Guo, S Bhatkar, K Roundy
US Patent 9,166,997, 2015
632015
Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices
Y Zou, K Roundy, A Tamersoy, S Shintre, J Roturier, F Schaub
592020
Generating graph snapshots from streaming edge data
S Soundarajan, A Tamersoy, EB Khalil, T Eliassi-Rad, DH Chau, ...
Proceedings of the 25th international conference companion on world Wide Web …, 2016
532016
Trauma-informed computing: Towards safer technology experiences for all
JX Chen, A McDonald, Y Zou, E Tseng, KA Roundy, A Tamersoy, ...
Proceedings of the 2022 CHI conference on human factors in computing systems …, 2022
512022
“Real Attackers Don't Compute Gradients”: Bridging the Gap Between Adversarial ML Research and Practice
G Apruzzese, HS Anderson, S Dambra, D Freeman, F Pierazzi, K Roundy
2023 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), 339-364, 2023
46*2023
The Many Kinds of Creepware Used for Interpersonal Attacks
KA Roundy, P Bermaimon Mendelberg, N Dell, D McCoy, D Nissani, ...
IEEE Symposium on Security and Privacy, 2020
432020
Systems and methods for using user-input information to identify computer security threats
K Roundy
US Patent 9,166,995, 2015
392015
Systems and methods for adjusting suspiciousness scores in event-correlation graphs
A Tamersoy, K Roundy, S Bhatkar, E Khalil
US Patent 9,148,441, 2015
392015
Efficient, sensitivity resistant binary instrumentation
AR Bernat, K Roundy, BP Miller
Proceedings of the 2011 International Symposium on Software Testing and …, 2011
272011
The role of computer security customer support in helping survivors of intimate partner violence
Y Zou, A McDonald, J Narakornpichit, N Dell, T Ristenpart, K Roundy, ...
30th USENIX security symposium (USENIX Security 21), 429-446, 2021
212021
Systems and methods for detecting malware using file clustering
A Tamersoy, KA Roundy, D Marino
US Patent 9,185,119, 2015
192015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20