Teryl Taylor

According to our database1, Teryl Taylor authored at least 21 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Evaluating Feature Robustness for Windows Malware Family Classification.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

Malware Family Classification via Residual Prefetch Artifacts.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

Evidential Cyber Threat Hunting.
CoRR, 2021

Improving cybersecurity hygiene through JIT patching.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Towards an Open Format for Scalable System Telemetry.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Cross-Stack Threat Sensing for Cyber Security and Resilience.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

Dressed up: Baiting Attackers through Endpoint Service Projection.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Using Context to Improve Network-based Exploit Kit Detection.
PhD thesis, 2016

Cache, Trigger, Impersonate: Enabling Context-Sensitive Honeyclient Analysis On-the-Wire.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

BotMeter: Charting DGA-Botnet Landscapes in Large Networks.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Detecting Malicious Exploit Kits using Tree-based Similarity Searches.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Stability Visualizations as a Low-complexity Descriptor of Network Host Behaviour.
Proceedings of the 4th International Conference on Ambient Systems, 2013

Toward Efficient Querying of Compressed Network Payloads.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

Cuckoo bags for exploring multikey data.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Over flow: An overview visualization for network analysis.
Proceedings of the 6th International Workshop on Visualization for Cyber Security, 2009

NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior.
Proceedings of the 4th International Workshop on Visualization for Computer Security, 2007