Blake Anderson
Blake Anderson
Verified email at
Cited by
Cited by
Graph-based malware detection using dynamic analysis
B Anderson, D Quist, J Neil, C Storlie, T Lane
Journal in computer Virology 7, 247-258, 2011
Identifying encrypted malware traffic with contextual flow data
B Anderson, D McGrew
Proceedings of the 2016 ACM workshop on artificial intelligence and security …, 2016
Machine learning for encrypted malware traffic classification: accounting for noisy labels and non-stationarity
B Anderson, D McGrew
Proceedings of the 23rd ACM SIGKDD International Conference on knowledge …, 2017
Deciphering malware’s use of TLS (without decryption)
B Anderson, S Paul, D McGrew
Journal of Computer Virology and Hacking Techniques 14, 195-211, 2018
Improving malware classification: bridging the static/dynamic gap
B Anderson, C Storlie, T Lane
Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012
Integrating multiple data sources for malware classification
BH Anderson, CB Storlie, T Lane
US Patent 9,021,589, 2015
OS fingerprinting: New techniques and a study of information gain and obfuscation
B Anderson, D McGrew
2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017
Analyzing encrypted traffic behavior using contextual traffic data
J Kohout, BH Anderson, M Grill, D McGrew, M Kopp, T Pevny
US Patent 10,805,338, 2020
Automating reverse engineering with machine learning techniques
B Anderson, C Storlie, M Yates, A McPhall
Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014
Enhanced telemetry for encrypted threat analytics
D McGrew, B Anderson
2016 IEEE 24th International Conference on Network Protocols (ICNP), 1-6, 2016
Stochastic identification of malware with dynamic traces
C Storlie, B Anderson, SV Wiel, D Quist, C Hash, N Brown
The Annals of Applied Statistics, 1-18, 2014
TLS beyond the browser: Combining end host and network data to understand application behavior
B Anderson, D McGrew
Proceedings of the Internet Measurement Conference, 379-392, 2019
An automated method for segmenting white matter lesions through multi-level morphometric feature classification with application to lupus
M Scully, B Anderson, T Lane, C Gasparovic, V Magnotta, W Sibbitt, ...
Frontiers in human neuroscience, 27, 2010
Subroutine based detection of APT malware
J Sexton, C Storlie, B Anderson
Journal of Computer Virology and Hacking Techniques 12, 225-233, 2016
A study of usability-aware network trace anonymization
K Mivule, B Anderson
2015 Science and Information Conference (SAI), 1293-1304, 2015
Bayesian networks with prior knowledge for malware phylogenetics
D Oyen, B Anderson, C Anderson-Cook
Workshops at the Thirtieth AAAI Conference on Artificial Intelligence, 2016
Malware classification and attribution through server fingerprinting using server certificate data
BH Anderson, D McGrew, S Paul, I Nikolaev, M Grill
US Patent 10,686,831, 2020
Passive decryption on encrypted traffic to generate more accurate machine learning training data
BH Anderson, A Chi, D McGrew, SW Dunlop
US Patent 10,536,268, 2020
Malware phylogenetics based on the multiview graphical lasso
B Anderson, T Lane, C Hash
Advances in Intelligent Data Analysis XIII: 13th International Symposium …, 2014
Identifying and using DNS contextual flows
D McGrew, BH Anderson, DG Wing, F Andreasen
US Patent 10,505,970, 2019
The system can't perform the operation now. Try again later.
Articles 1–20