Follow
Joshua C Neil
Joshua C Neil
Founder, Alpha Level
Verified email at alphalevelsec.com
Title
Cited by
Cited by
Year
Graph-based malware detection using dynamic analysis
B Anderson, D Quist, J Neil, C Storlie, T Lane
Journal in computer Virology 7, 247-258, 2011
3852011
Eliminating steganography in Internet traffic with active wardens
G Fisk, M Fisk, C Papadopoulos, J Neil
Information Hiding: 5th International Workshop, IH 2002 Noordwijkerhout, The …, 2003
2692003
Scan statistics for the online detection of locally anomalous subgraphs
J Neil, C Hash, A Brugh, M Fisk, CB Storlie
Technometrics 55 (4), 403-414, 2013
1632013
Authentication graphs: Analyzing user behavior within an enterprise network
AD Kent, LM Liebrock, JC Neil
Computers & Security 48, 150-166, 2015
972015
Anomaly detection to identify coordinated group attacks in computer networks
JC Neil, M Turcotte, NA Heard
US Patent App. 14/383,024, 2015
802015
Attack chain detection
J Sexton, C Storlie, J Neil
Statistical Analysis and Data Mining: The ASA Data Science Journal 8 (5-6 …, 2015
672015
Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness
JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent
US Patent 9,560,065, 2017
662017
Detecting cyber attacks using anomaly detection with explanations and expert feedback
MA Siddiqui, JW Stokes, C Seifert, E Argyle, R McCann, J Neil, J Carroll
ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019
552019
A large-scale database for graph representation learning
S Freitas, Y Dong, J Neil, DH Chau
arXiv preprint arXiv:2011.07682, 2020
522020
Connected components and credential hopping in authentication graphs
A Hagberg, N Lemons, A Kent, J Neil
2014 Tenth International Conference on Signal-Image Technology and Internet …, 2014
442014
Dynamic networks and cyber-security
NM Adams, NA Heard
World Scientific, 2016
392016
Using new edges for anomaly detection in computer networks
JC Neil
US Patent 9,038,180, 2015
352015
Living-off-the-land command detection using active learning
T Ongun, JW Stokes, JB Or, K Tian, F Tajaddodianfar, J Neil, C Seifert, ...
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
302021
Detecting anomalous behavior via user authentication graphs
A Kent, J Neil, L Liebrock
US Patent 10,015,175, 2018
292018
Improving antivirus accuracy with hypervisor assisted analysis
D Quist, L Liebrock, J Neil
Journal in computer virology 7, 121-131, 2011
272011
Path scanning for the detection of anomalous subgraphs and use of dns requests and host agents for anomaly/change detection and network situational awareness
JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent
US Patent App. 16/278,225, 2019
252019
D2M: Dynamic Defense and Modeling of Adversarial Movement in Networks
S Freitas, A Wicker, DH Chau, J Neil
Proceedings of the 2020 SIAM International Conference on Data Mining, 541-549, 2020
232020
Anomaly detection in large-scale networks with latent space models
W Lee, TH McCormick, J Neil, C Sodja, Y Cui
Technometrics 64 (2), 241-252, 2022
192022
Towards improved detection of attackers in computer networks: New edges, fast updating, and host agents
J Neil, B Uphoff, C Hash, C Storlie
2013 6th International Symposium on Resilient Control Systems (ISRCS), 218-224, 2013
192013
A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks
J Grana, D Wolpert, J Neil, D Xie, T Bhattacharya, R Bent
Journal of Network and Computer Applications 66, 166-179, 2016
182016
The system can't perform the operation now. Try again later.
Articles 1–20