The operational role of security information and event management systems S Bhatt, PK Manadhata, L Zomlot IEEE security & Privacy 12 (5), 35-41, 2014 | 332 | 2014 |
A tale of three security operation centers SC Sundaramurthy, J Case, T Truong, L Zomlot, M Hoffmann Proceedings of the 2014 ACM workshop on security information workers, 43-50, 2014 | 76 | 2014 |
Prioritizing intrusion analysis using Dempster-Shafer theory L Zomlot, SC Sundaramurthy, K Luo, X Ou, SR Rajagopalan Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011 | 71 | 2011 |
Aiding Intrusion Analysis using Machine Learning L Zomlot, SC Sundaramurthy, D Caragea, X Ou 12th International Conference on Machine Learning and Applications (ICMLA), 2013 | 29 | 2013 |
Practical IDS alert correlation in the face of dynamic threats SC Sundaramurthy, L Zomlot, X Ou Proceedings of the International Conference on Security and Management (SAM), 1, 2011 | 26 | 2011 |
Classification of UDP Traffic for DDoS Detection AG Bardas, L Zomlot, S Chandran, X Ou, SR Rajagopalan, ... 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '12), 2012 | 15 | 2012 |
Handling uncertainty in intrusion analysis L Zomlot Kansas State University, 2014 | 2 | 2014 |
The role of processes in security operations centers S Bhatt, W Horne, S Sundaramurthy, L Zomlot Psychosocial dynamics of cyber security, 86-103, 2016 | 1 | 2016 |
Propagating belief information about malicious and benign nodes L Zomlot, PK Manadhata US Patent 11,128,641, 2021 | | 2021 |
{Classification} of {UDP}{Traffic} for {DDoS} Detection AG Bardas, L Zomlot, SC Sundaramurthy, X Ou, SR Rajagopalan, ... 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12), 2012 | | 2012 |
Practical IDS alert correlation in the face of dynamic threats S CHANDRAN SUNDARAMURTHY, L ZOMLOT, X OU SAM 2011: proceedings of the 2011 international conference on security …, 2011 | | 2011 |