Steven Gianvecchio
Steven Gianvecchio
Lead Scientist, MITRE
Email verificata su mitre.org
TitoloCitata daAnno
Who is tweeting on Twitter: human, bot, or cyborg?
Z Chu, S Gianvecchio, H Wang, S Jajodia
Proceedings of the 26th annual computer security applications conference, 21-30, 2010
5322010
Detecting automation of twitter accounts: Are you a human, bot, or cyborg?
Z Chu, S Gianvecchio, H Wang, S Jajodia
IEEE Transactions on Dependable and Secure Computing 9 (6), 811-824, 2012
4752012
Detecting covert timing channels: an entropy-based approach
S Gianvecchio, H Wang
Proceedings of the 14th ACM conference on Computer and communicationsá…, 2007
2202007
Model-based covert timing channels: Automated modeling and evasion
S Gianvecchio, H Wang, D Wijesekera, S Jajodia
International Workshop on Recent Advances in Intrusion Detection, 211-230, 2008
1392008
An entropy-based approach to detecting covert timing channels
S Gianvecchio, H Wang
IEEE Transactions on Dependable and Secure Computing 8 (6), 785-797, 2010
1022010
Measurement and Classification of Humans and Bots in Internet Chat.
S Gianvecchio, M Xie, Z Wu, H Wang
USENIX security symposium, 155-170, 2008
982008
Battle of botcraft: fighting bots in online games with human observational proofs
S Gianvecchio, Z Wu, M Xie, H Wang
Proceedings of the 16th ACM conference on Computer and communicationsá…, 2009
952009
Humans and bots in internet chat: measurement, analysis, and automated classification
S Gianvecchio, M Xie, Z Wu, H Wang
IEEE/ACM Transactions On Networking 19 (5), 1557-1571, 2011
582011
Blog or block: Detecting blog bots through behavioral biometrics
Z Chu, S Gianvecchio, A Koehl, H Wang, S Jajodia
Computer Networks 57 (3), 634-646, 2013
492013
Mimimorphism: A new approach to binary code obfuscation
Z Wu, S Gianvecchio, M Xie, H Wang
Proceedings of the 17th ACM conference on Computer and communicationsá…, 2010
492010
Zeuslite: a tool for botnet analysis in the classroom
K Hannah, S Gianvecchio
Journal of Computing Sciences in Colleges 30 (3), 109-116, 2015
32015
Bot or Human? A Behavior-Based Online Bot Detection System
Z Chu, S Gianvecchio, H Wang
From Database to Cyber Security, 432-449, 2018
22018
Application of information theory and statistical learning to anomaly detection
S Gianvecchio
22010
Closing the Gap with APTs Through Semantic Clusters and Automated Cybergames
S Gianvecchio, C Burkhalter, H Lan, A Sillers, K Smith
International Conference on Security and Privacy in Communication Systemsá…, 2019
2019
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–14