| Malware phylogeny generation using permutations of code M Karim, A Walenstein, A Lakhotia, L Parida Journal in Computer Virology 1 (1), 13-23, 2005 | 346 | 2005 |
| Cyber-physical systems security ME Karim, VV Phoha Applied Cyber-Physical Systems, 75-83, 2014 | 35 | 2014 |
| Phylogeny generation A Lakhotia, ME Karim, A Walenstein US Patent 7,873,947, 2011 | 33 | 2011 |
| Analyzing memory accesses in obfuscated x86 executables M Venable, MR Chouchane, ME Karim, A Lakhotia International Conference on Detection of Intrusions and Malware, and …, 2005 | 26 | 2005 |
| Malware phylogeny using maximal pi-patterns ME Karim, A Walenstein, A Lakhotia, L Parida EICAR 2005 Conference: Best Paper Proceedings, 156-174, 2005 | 20 | 2005 |
| Using permutation patterns for content-based phylogeny ME Karim, L Parida, A Lakhotia International Workshop on Pattern Recognition in Bioinformatics, 115-125, 2006 | 7 | 2006 |
| Context-aware active authentication using touch gestures, typing patterns and body movement M O'Neal, K Balagani, V Phoha, A Rosenberg, A Serwadda, ME Karim LOUISIANA TECH UNIVERSITY Ruston United States, 2016 | 6 | 2016 |
| A non-interactive dual channel continuous traffic authentication protocol D Irakiza, ME Karim, VV Phoha IEEE transactions on information forensics and security 9 (7), 1133-1140, 2014 | 6 | 2014 |
| Recognizing TATA promoters based on discriminating frequency analysis of neighborhood tuples R Loganantharaj, ME Karim, A Lakhotia Biot-04: First Biotechnology and Bioinformatics Symposium: A Community and …, 2004 | 4 | 2004 |
| Calculus for reasoning about contextual information M Karim Introduction to Contextual Processing: Theory and Applications, 75-94, 2010 | | 2010 |
| An immunological model for detecting bot activities ME Karim, VV Phoha, MA Sultan Intelligent Sensing, Situation Management, Impact Assessment, and Cyber …, 2009 | | 2009 |
| MinMax interval trees ME Karim University of Louisiana at Lafayette, 2007 | | 2007 |