A context-based detection framework for advanced persistent threats P Giura, W Wang 2012 International Conference on Cyber Security, 69-74, 2012 | 135 | 2012 |
Using large scale distributed computing to unveil advanced persistent threats P Giura, W Wang Science J 1 (3), 93-105, 2012 | 109 | 2012 |
Highly efficient techniques for network forensics M Ponec, P Giura, H Brönnimann, J Wein Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 51 | 2007 |
Mitigating sms spam by online detection of repetitive near-duplicate messages B Coskun, P Giura 2012 IEEE International Conference on Communications (ICC), 999-1004, 2012 | 41 | 2012 |
New payload attribution methods for network forensic investigations M Ponec, P Giura, J Wein, H Brönnimann ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-32, 2010 | 41 | 2010 |
Netstore: An efficient storage infrastructure for network forensics and monitoring P Giura, N Memon International Workshop on Recent Advances in Intrusion Detection, 277-296, 2010 | 34 | 2010 |
Is it really you? User identification via adaptive behavior fingerprinting P Giura, I Murynets, R Piqueras Jover, Y Vahlis Proceedings of the 4th ACM conference on Data and application security and …, 2014 | 23 | 2014 |
Blockchain solution for an automated advertising marketplace L Johnson, H Fischmann, C Serban, J Morovitz, P Giura US Patent 11,132,707, 2021 | 19 | 2021 |
Method and apparatus for ranking apps in the wide-open internet AG Forte, B Coskun, Q Shen, I Murynets, J Bickford, M Istomin, P Giura, ... US Patent App. 13/540,249, 2014 | 19 | 2014 |
Enterprise server behavior profiling P Giura, S Nurilov, M Sankore, C Spielman US Patent 10,797,974, 2020 | 16 | 2020 |
Enterprise server behavior profiling P Giura, S Nurilov, M Sankore, C Spielman US Patent 10,367,704, 2019 | 16 | 2019 |
Methods of generating signatures from groups of electronic messages and related methods and systems for identifying spam messages P Giura, B Coskun US Patent 10,333,877, 2019 | 15 | 2019 |
Methods, systems, and computer program products for verifying user data access policies when server and/or user are not trusted E Vahlis, P Giura US Patent 9,171,174, 2015 | 14 | 2015 |
System for distributing virtual entity behavior profiling in cloud deployments P Giura, G De Los Reyes US Patent 10,291,648, 2019 | 13 | 2019 |
How vulnerabilities in wireless networks can enable Advanced Persistent Threats RP Jover, P Giura International Journal on Information Technology (IREIT) 1 (2), 145-151, 2013 | 13 | 2013 |
Computation of historical data P Giura US Patent 10,129,212, 2018 | 9 | 2018 |
Method and apparatus for robust mobile application fingerprinting AG Forte, B Coskun, Q Shen, I Murynets, J Bickford, M Istomin, P Giura, ... US Patent App. 13/540,307, 2014 | 9 | 2014 |
Safe internet browsing using a transparent virtual browser J Bickford, P Giura 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015 | 8 | 2015 |
Methods, systems, and computer program products for protecting a communication network against internet enabled cyber attacks through use of screen replication from controlled … P Giura, JE Bickford, G De Los Reyes US Patent 9,258,324, 2016 | 7 | 2016 |
Verification service Q Shen, AG Forte, P Giura, M Istomin, E Vahlis, W Wang US Patent 8,739,247, 2014 | 6 | 2014 |