Richard E. Harang

Affiliations:
  • Sophos
  • US Army Research Laboratory, Adelphi, MD, USA (former)


According to our database1, Richard E. Harang authored at least 37 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Catastrophic Forgetting in the Context of Model Updates.
CoRR, 2023

Magnificent Minified Models.
CoRR, 2023

2020
SOREL-20M: A Large Scale Benchmark Dataset for Malicious PE Detection.
CoRR, 2020

CATBERT: Context-Aware Tiny BERT for Detecting Social Engineering Emails.
CoRR, 2020

2019
Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments.
Proc. Priv. Enhancing Technol., 2019

Statistical Models for the Number of Successful Cyber Intrusions.
CoRR, 2019

ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
Principled Uncertainty Estimation for Deep Neural Networks.
CoRR, 2018

MEADE: Towards a Malicious Email Attachment Detection Engine.
CoRR, 2018

A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Git blame who?: stylistic authorship attribution of small, incomplete source code fragments.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

2017
Burstiness of Intrusion Detection Process: Empirical Evidence and a Modeling Approach.
IEEE Trans. Inf. Forensics Secur., 2017

Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

Identifying Key Cyber-Physical Terrain (Extended Version).
CoRR, 2017

Machine learning in malware traffic classifications.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Source Code Authorship Attribution Using Long Short-Term Memory Based Networks.
Proceedings of the Computer Security - ESORICS 2017, 2017

Identifying Key Cyber-Physical Terrain.
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017

2016
Grammatical Inference and Machine Learning Approaches to Post-Hoc LangSec.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

A Fast Kernel for Attributed Graphs.
Proceedings of the 2016 SIAM International Conference on Data Mining, 2016

Slowing the spread of Bluetooth-based malware in mobile tactical networks.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Crafting adversarial input sequences for recurrent neural networks.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Measuring and Improving the Effectiveness of Defense-in-Depth Postures.
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 2016

Micro-signatures: The Effectiveness of Known Bad N-Grams for Network Anomaly Detection.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

2015
Evasion-resistant network scan detection.
Secur. Informatics, 2015

De-anonymizing Programmers via Code Stylometry.
Proceedings of the 24th USENIX Security Symposium, 2015

Grammatical Inference and Language Frameworks for LANGSEC.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

A framework to evaluate cyber agility.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Defensive Resource Allocations with Security Chokepoints in IPv6 Networks.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

2014
Learning and Semantics.
Proceedings of the Cyber Defense and Situational Awareness, 2014

Bridging the Semantic Gap: Human Factors in Anomaly-Based Intrusion Detection Systems.
Proceedings of the Network Science and Cybersecurity, 2014

Using Network Tainting to Bound the Scope of Network Ingress Attacks.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

Lightweight Packing of Log Files for Improved Compression in Mobile Tactical Networks.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

2013
Rapid Permissions-Based Detection and Analysis of Mobile Malware Using Random Decision Forests.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Limitations to threshold random walk scan detection and mitigating enhancements.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Clustering of Snort alerts to identify patterns and reduce analyst workload.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Identification of anomalous network security token usage via clustering and density estimation.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012


  Loading...