Sabyasachi Saha
Sabyasachi Saha
Principal Data Scientist
Correu electrònic verificat a narus.com - Pàgina d'inici
Títol
Citada per
Citada per
Any
Nazca: Detecting Malware Distribution in Large-Scale Networks.
L Invernizzi, S Miskovic, R Torres, C Kruegel, S Saha, G Vigna, SJ Lee, ...
NDSS 14, 23-26, 2014
1412014
Class discovery for automated discovery, attribution, analysis, and risk assessment of security threats
A Nucci, PM Comar, S Saha, L Liu
US Patent 8,418,249, 2013
1252013
Detecting malicious endpoints using network connectivity and flow information
S Saha, L Liu, R Torres, J Xu, A Nucci
US Patent US8813236 B1, 2014
1202014
Combining supervised and unsupervised learning for zero-day malware detection
PM Comar, L Liu, S Saha, PN Tan, A Nucci
2013 Proceedings IEEE INFOCOM, 2022-2030, 2013
982013
Modeling opponent decision in repeated one-shot negotiations
S Saha, A Biswas, S Sen
Proceedings of the fourth international joint conference on Autonomous …, 2005
752005
Systematic mining of associated server herds for uncovering malware and attack campaigns
J Zhang, S Saha, G Gu, SJ Lee, B Nardelli
US Patent 9,088,598, 2015
732015
Detecting malicious http redirections using trees of user browsing activity
H Mekky, R Torres, ZL Zhang, S Saha, A Nucci
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1159-1167, 2014
662014
Reciprocal resource sharing in P2P environments
D Banerjee, S Saha, S Sen, P Dasgupta
Proceedings of the fourth international joint conference on Autonomous …, 2005
572005
Detecting suspicious network behaviors based on domain name service failures
P Luo, R Torres, Z Zhang, S Saha, SJ Lee, A Nucci
US Patent 9,245,121, 2016
382016
An Efficient Protocol for Negotiation over Multiple Indivisible Resources.
S Saha, S Sen
IJCAI 7, 1494-1499, 2007
352007
Helping based on future expectations
S Saha, S Sen, PS Dutta
Proceedings of the Second International Joint Conference on Autonomous …, 2003
312003
Systematic mining of associated server herds for malware campaign discovery
J Zhang, S Saha, G Gu, SJ Lee, M Mellia
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
282015
Automated discovery, attribution, analysis, and risk assessment of security threats
A Nucci, S Saha
US Patent 9,094,288, 2015
252015
Detecting malicious clients in isp networks using http connectivity graph and flow information
L Liu, S Saha, R Torres, J Xu, PN Tan, A Nucci, M Mellia
2014 IEEE/ACM International Conference on Advances in Social Networks …, 2014
242014
Detecting malicious HTTP redirections using user browsing activity trees
R Torres, H Mekky, Z Zhang, S Saha, A Nucci
US Patent 9,531,736, 2016
222016
Detecting malware infestations in large-scale networks
L Invernizzi, S Miskovic, R Torres, S Saha, C Kruegel, A Nucci, SJ Lee, ...
US Patent 8,959,643, 2015
212015
YouLighter: A cognitive approach to unveil YouTube CDN and changes
D Giordano, S Traverso, L Grimaudo, M Mellia, E Baralis, A Tongaonkar, ...
IEEE Transactions on Cognitive Communications and Networking 1 (2), 161-174, 2015
202015
Recursive nmf: Efficient label tree learning for large multi-class problems
L Liu, PM Comar, S Saha, PN Tan, A Nucci
Proceedings of the 21st International Conference on Pattern Recognition …, 2012
182012
MAGMA network behavior classifier for malware traffic
E Bocchi, L Grimaudo, M Mellia, E Baralis, S Saha, S Miskovic, ...
Computer Networks 109, 142-156, 2016
172016
A Bayes net approach to argumentation based negotiation
S Saha, S Sen
International Workshop on Argumentation in Multi-Agent Systems, 208-222, 2004
152004
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20