Scalable malware classification with multifaceted content features and threat intelligenceXin HuJiyong Janget al.2016IBM J. Res. Dev
Security intelligence for cloud management infrastructuresS. BergerShelly Garionet al.2016IBM J. Res. Dev
A platform and analytics for usage and entitlement analyticsSuresh ChariT.A. Habecket al.2016IBM J. Res. Dev
Passive security intelligence to analyze the security risks of mobile/BYOD activitiesMarc StoecklinKapil Singhet al.2016IBM J. Res. Dev
Scalable analytics to detect DNS misuse for establishing stealthy communication channelsDouglas L. SchalesJiyong Janget al.2016IBM J. Res. Dev
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibilityS. BergerY. Chenet al.2016IBM J. Res. Dev
Data classification and sensitivity estimation for critical asset discoveryYoungja ParkW. Teikenet al.2016IBM J. Res. Dev
Uncovering insider threats from the digital footprints of individualsAnni CodenW.S. Linet al.2016IBM J. Res. Dev
Security 360°: Enterprise security for the cognitive eraJosyula R. RaoSuresh Chariet al.2016IBM J. Res. Dev