Malware clustering using suffix trees Ciprian OprişaGeorge CabăuGheorghe Sebestyen Pal Invited Paper 24 October 2014 Pages: 1 - 10
Longitudinal analysis of a large corpus of cyber threat descriptions Ghita MezzourL. Richard CarleyKathleen M. Carley Original Paper 27 June 2014 Pages: 11 - 22
U-HIPE: hypervisor-based protection of user-mode processes in Windows Andrei LuțașAdrian ColeșaDan Luțaș Original Paper 04 February 2015 Pages: 23 - 36
A practical approach for clustering large data flows of malicious URLs Adrian-Ştefan PopescuDragoş-Teodor GavriluţDaniel-Ionuţ Irimia Original Paper 19 February 2015 Pages: 37 - 47