Blake Anderson

Orcid: 0000-0002-4185-5801

According to our database1, Blake Anderson authored at least 35 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Assessing and Exploiting Domain Name Misinformation.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Prioritizing Remediation of Enterprise Hosts by Malware Execution Risk.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
AugRE: Augmented Robot Environment to Facilitate Human-Robot Teaming and Communication.
Proceedings of the 31st IEEE International Conference on Robot and Human Interactive Communication, 2022

Yours, Mine, and Ours: Exploring When Your Data Becomes Health Data.
Proceedings of the AMIA 2022, 2022

2021
Designing a Cloud-Based System for Affordable Cyberinfrastructure to Support Software-Based Research.
Proceedings of the MEDINFO 2021: One World, One Health - Global Partnership for Digital Innovation, 2021

2020
Accurate TLS Fingerprinting using Destination Context and Knowledge Bases.
CoRR, 2020

Hekademeia: Sustainable Research Technology Infrastructure for Persistent Project Access Across Funding Gaps.
Proceedings of the AMIA 2020, 2020

2019
TLS Beyond the Browser: Combining End Host and Network Data to Understand Application Behavior.
Proceedings of the Internet Measurement Conference, 2019

Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Deciphering malware's use of TLS (without decryption).
J. Comput. Virol. Hacking Tech., 2018

An In-Depth Study of Open-Source Command and Control Frameworks.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

2017
Order priors for Bayesian network discovery with an application to malware phylogeny.
Stat. Anal. Data Min., 2017

Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

OS fingerprinting: New techniques and a study of information gain and obfuscation.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Subroutine based detection of APT malware.
J. Comput. Virol. Hacking Tech., 2016

Enhanced telemetry for encrypted threat analytics.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Identifying Encrypted Malware Traffic with Contextual Flow Data.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016

Bayesian Networks with Prior Knowledge for Malware Phylogenetics.
Proceedings of the Artificial Intelligence for Cyber Security, 2016

Discovering Human and Machine Readable Descriptions of Malware Families.
Proceedings of the Artificial Intelligence for Cyber Security, 2016

2015
Malware Detection Using Nonparametric Bayesian Clustering and Classification Techniques.
Technometrics, 2015

2014
Malware Phylogenetics Based on the Multiview Graphical Lasso.
Proceedings of the Advances in Intelligent Data Analysis XIII, 2014

Automating Reverse Engineering with Machine Learning Techniques.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

2013
TeleMDID: Mobile technology applications for interactive diagnoses in teledermatology clinics.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

A system for limb-volume measurement using 3D models from an infrared depth sensor.
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Healthcare and e-health, 2013

2012
Role of domain knowledge in developing user-centered medical-image indexing.
J. Assoc. Inf. Sci. Technol., 2012

Multiple Kernel Learning Clustering with an Application to Malware.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Improving disease management through a mobile application for lymphedema patients.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

Improving malware classification: bridging the static/dynamic gap.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

A Study of Dermatological Image Search, Archive, and Use Behaviors.
Proceedings of the AMIA 2012, 2012

2011
Graph-based malware detection using dynamic analysis.
J. Comput. Virol., 2011

Why searchers switch: understanding and predicting engine switching rationales.
Proceedings of the Proceeding of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2011

Medical image describing behavior: a comparison between an expert and novice.
Proceedings of the iConference 2011, 2011

Detecting Code Injection Attacks in Internet Explorer.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Search tactics for medical image retrieval.
Proceedings of the Bridging the Gulf: Communication and Information in Society, Technology, and Work, 2011

2010
Predicting query performance using query, result, and user interaction features.
Proceedings of the Recherche d'Information Assistée par Ordinateur, 2010


  Loading...