| Malware and machine learning C LeDoux, A Lakhotia Intelligent Methods for Cyber Warfare, 1-42, 2014 | 51 | 2014 |
| Identifying shared software components to support malware forensics B Ruttenberg, C Miles, L Kellogg, V Notani, M Howard, C LeDoux, ... International Conference on Detection of Intrusions and Malware, and …, 2014 | 49 | 2014 |
| VirusBattle: State-of-the-art malware analysis for better cyber threat intelligence C Miles, A Lakhotia, C LeDoux, A Newsom, V Notani 2014 7th International Symposium on Resilient Control Systems (ISRCS), 1-6, 2014 | 40 | 2014 |
| Instruction embedding for improved obfuscation C LeDoux, M Sharkey, B Primeaux, C Miles Proceedings of the 50th annual ACM Southeast Conference, 130-135, 2012 | 25 | 2012 |
| {FuncTracker}: Discovering Shared Code to Aid Malware Forensics C LeDoux, A Lakhotia, C Miles, V Notani, A Pfeffer 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 13), 2013 | 16 | 2013 |
| Cluster analysis for deobfuscation of malware variants during ransomware attacks A Arrott, A Lakhotia, F Leitold, C LeDoux 2018 international conference on cyber situational awareness, data analytics …, 2018 | 7 | 2018 |
| Malware economics and its implication to anti-malware situational awareness A Lakhotia, V Notani, C LeDoux 2018 International Conference On Cyber Situational Awareness, Data Analytics …, 2018 | 6 | 2018 |
| Improved malware classification through sensor fusion using disjoint union C LeDoux, A Walenstein, A Lakhotia International Conference on Information Systems, Technology and Management …, 2012 | 6 | 2012 |
| Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks C LeDoux University of Louisiana at Lafayette, 2016 | 1 | 2016 |
| Feature Fusion Across Domains for Improved Malware Classification C LeDoux University of Louisiana at Lafayette, 2011 | | 2011 |