Fingerprinting cryptographic protocols with key exchange using an entropy measure S Luo, JD Seideman, S Dietrich 2018 IEEE Security and Privacy Workshops (SPW), 170-179, 2018 | 13 | 2018 |
QuickBCC: Quick and scalable binary vulnerable code clone detection H Jang, K Yang, G Lee, Y Na, JD Seideman, S Luo, H Lee, S Dietrich IFIP International Conference on ICT Systems Security and Privacy Protection …, 2021 | 8 | 2021 |
Methods and apparatus for intrusion prevention using global and local feature extraction contexts JD Hagen, JE Andersson, S Luo, B Niemczyk, L Zsohar, C Botkin, ... US Patent 10,728,268, 2020 | 8 | 2020 |
Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric Spaces P Duessel, S Luo, U Flegel, S Dietrich, M Meier 2020 13th International Conference on Systematic Approaches to Digital …, 2020 | 6 | 2020 |
DISTRIBUTION BASED DETECTION OF ABUSIVE REQUESTS S Luo, Y Lin, S Saluja, R Han US Patent 11,457,034, 2022 | 3 | 2022 |
Dynamic rate limiting for mitigating distributed denial-of-service attacks S Luo, J Zhang US Patent 11,108,813, 2021 | 2 | 2021 |
Examining customer responses to fake online reviews: the role of suspicion and product knowledge J Ren, P Ozturk, S Luo Internetworked World: 15th Workshop on e-Business, WeB 2016, Dublin, Ireland …, 2017 | 2 | 2017 |
Detection of periodic transmissions for identifying malicious computers S Luo, JE Andersson, JD Hagen US Patent 11,063,969, 2021 | 1 | 2021 |
Structural Anomaly Detection S Luo City University of New York, 2023 | | 2023 |
Methods and apparatus for intrusion prevention using global and local feature extraction contexts JD Hagen, JE Andersson, S Luo, B Niemczyk, L Zsohar, C Botkin, ... US Patent 11,044,265, 2021 | | 2021 |