Detecting automation of twitter accounts: Are you a human, bot, or cyborg? Z Chu, S Gianvecchio, H Wang, S Jajodia IEEE Transactions on dependable and secure computing 9 (6), 811-824, 2012 | 950 | 2012 |
Who is tweeting on Twitter: human, bot, or cyborg? Z Chu, S Gianvecchio, H Wang, S Jajodia Proceedings of the 26th annual computer security applications conference, 21-30, 2010 | 783 | 2010 |
Detecting covert timing channels: an entropy-based approach S Gianvecchio, H Wang Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 262 | 2007 |
Model-based covert timing channels: Automated modeling and evasion S Gianvecchio, H Wang, D Wijesekera, S Jajodia Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008 | 210 | 2008 |
An entropy-based approach to detecting covert timing channels S Gianvecchio, H Wang IEEE Transactions on Dependable and Secure Computing 8 (6), 785-797, 2010 | 167 | 2010 |
Measurement and classification of humans and bots in internet chat. S Gianvecchio, M Xie, Z Wu, H Wang USENIX security symposium, 155-170, 2008 | 136 | 2008 |
Battle of botcraft: fighting bots in online games with human observational proofs S Gianvecchio, Z Wu, M Xie, H Wang Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 123 | 2009 |
Blog or block: Detecting blog bots through behavioral biometrics Z Chu, S Gianvecchio, A Koehl, H Wang, S Jajodia Computer Networks 57 (3), 634-646, 2013 | 92 | 2013 |
Humans and bots in internet chat: measurement, analysis, and automated classification S Gianvecchio, M Xie, Z Wu, H Wang IEEE/ACM Transactions On Networking 19 (5), 1557-1571, 2011 | 89 | 2011 |
Mimimorphism: A new approach to binary code obfuscation Z Wu, S Gianvecchio, M Xie, H Wang Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 80 | 2010 |
Bot or human? A behavior-based online bot detection system Z Chu, S Gianvecchio, H Wang From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the …, 2018 | 41 | 2018 |
Closing the gap with APTs through semantic clusters and automated cybergames S Gianvecchio, C Burkhalter, H Lan, A Sillers, K Smith Security and Privacy in Communication Networks: 15th EAI International …, 2019 | 14 | 2019 |
Zeuslite: a tool for botnet analysis in the classroom K Hannah, S Gianvecchio Journal of Computing Sciences in Colleges 30 (3), 109-116, 2015 | 8 | 2015 |
Application of information theory and statistical learning to anomaly detection S Gianvecchio The College of William and Mary, 2010 | 2 | 2010 |