Joshua Neil

According to our database1, Joshua Neil authored at least 22 papers between 2001 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Anomaly Detection in Large-Scale Networks With Latent Space Models.
Technometrics, 2022

Peer-group Behaviour Analytics of Windows Authentications Events Using Hierarchical Bayesian Modelling.
CoRR, 2022

2021
Link prediction in dynamic networks using random dot product graphs.
Data Min. Knowl. Discov., 2021

Living-Off-The-Land Command Detection Using Active Learning.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

A Large-Scale Database for Graph Representation Learning.
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021

2020
D2M: Dynamic Defense and Modeling of Adversarial Movement in Networks.
CoRR, 2020

D<sup>2</sup>M: Dynamic Defense and Modeling of Adversarial Movement in Networks.
Proceedings of the 2020 SIAM International Conference on Data Mining, 2020

Effective Detection of Credential Thefts from Windows Memory: Learning Access Behaviours to Local Security Authority Subsystem Service.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

2019
Anomaly Detection in Large Scale Networks with Latent Space Models.
CoRR, 2019

Detecting Cyber Attacks Using Anomaly Detection with Explanations and Expert Feedback.
Proceedings of the IEEE International Conference on Acoustics, 2019

2016
A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks.
J. Netw. Comput. Appl., 2016

A Likelihood Ratio Detector for Identifying Within-Perimeter Computer Network Attacks.
CoRR, 2016

2015
Attack chain detection.
Stat. Anal. Data Min., 2015

Authentication graphs: Analyzing user behavior within an enterprise network.
Comput. Secur., 2015

2014
Connected Components and Credential Hopping in Authentication Graphs.
Proceedings of the Tenth International Conference on Signal-Image Technology and Internet-Based Systems, 2014

Detecting Localised Anomalous Behaviour in a Computer Network.
Proceedings of the Advances in Intelligent Data Analysis XIII, 2014

2013
Scan Statistics for the Online Detection of Locally Anomalous Subgraphs.
Technometrics, 2013

Web Adoption: An Attempt Toward Classifying Risky Internet Web Browsing Behavior.
Proceedings of the 2013 Workshop on Learning from Authoritative Security Experiment Results, 2013

2011
Improving antivirus accuracy with hypervisor assisted analysis.
J. Comput. Virol., 2011

Graph-based malware detection using dynamic analysis.
J. Comput. Virol., 2011

2002
Eliminating Steganography in Internet Traffic with Active Wardens.
Proceedings of the Information Hiding, 5th International Workshop, 2002

2001
Characterizing Long Term Usage of a Mass Storage System At a Super Computer Site.
Proceedings of the 18th IEEE Symposium on Mass Storage Systems, 2001


  Loading...