Kevin A. Roundy
Kevin A. Roundy
NortonLifeLock Research Group (NRG) - Previously known as Symantec Research Labs
Email verificata su - Home page
TitoloCitata daAnno
Hybrid analysis and control of malware
KA Roundy, BP Miller
International Workshop on Recent Advances in Intrusion Detection, 317-338, 2010
Guilt by association: large scale malware detection by mining file-relation graphs
A Tamersoy, K Roundy, DH Chau
Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014
Binary-code obfuscations in prevalent packer tools
KA Roundy, BP Miller
ACM Computing Surveys (CSUR) 46 (1), 1-32, 2013
Device for monitoring a plurality of systems of an aircraft, in particular of a transport aircraft
C Le Draoullec, P Mailhou
US Patent 6,697,718, 2004
System, method and transceiver for mobile communications
D Bar-On, M Ketter, D Kramer
US Patent App. 10/200,395, 2003
Continuous fiber composite reinforced synthetic wood elements
A Branca
US Patent App. 10/242,187, 2004
Coordinated management of contracts and services particulary for telecommunications
S Houssiaux, A Laverriere, I Lebourg
US Patent App. 10/169,584, 2003
Systems and methods for using event-correlation graphs to detect attacks on computing systems
K Roundy, F Guo, S Bhatkar, T Cheng, J Fu, ZK Li, D Shou, S Sawhney, ...
US Patent 9,141,790, 2015
Systems and methods for using event-correlation graphs to generate remediation procedures
KA Roundy, S Bhatkar
US Patent 9,256,739, 2016
Reagents for oligonucleotide cleavage and deprotection
JS Nelson
US Patent 6,664,388, 2003
Systems and methods for reducing false positives when using event-correlation graphs to detect attacks on computing systems
F Guo, S Bhatkar, K Roundy
US Patent 9,166,997, 2015
VIGOR: interactive visual exploration of graph query results
R Pienta, F Hohman, A Endert, A Tamersoy, K Roundy, C Gates, ...
IEEE transactions on visualization and computer graphics 24 (1), 215-225, 2017
Systems and methods for classifying security events as targeted attacks
KA Roundy, S Bhatkar
US Patent 9,754,106, 2017
Generating graph snapshots from streaming edge data
S Soundarajan, A Tamersoy, EB Khalil, T Eliassi-Rad, DH Chau, ...
Proceedings of the 25th International Conference Companion on World Wide Web …, 2016
Method and system for improving data quality in large hyperlinked text databases using pagelets and templates
Z Bar-Yossef, S Rajagopalan
US Patent 6,968,331, 2005
Systems and methods for adjusting suspiciousness scores in event-correlation graphs
A Tamersoy, K Roundy, S Bhatkar, E Khalil
US Patent 9,148,441, 2015
Efficient, sensitivity resistant binary instrumentation
AR Bernat, K Roundy, BP Miller
Proceedings of the 2011 International Symposium on Software Testing and …, 2011
Systems and methods for using user-input information to identify computer security threats
K Roundy
US Patent 9,166,995, 2015
Large-scale identification of malicious singleton files
B Li, K Roundy, C Gates, Y Vorobeychik
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
Systems and methods for detecting security threats based on user profiles
F Guo, S Bhatkar, K Roundy
US Patent 9,401,925, 2016
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20