- J. M. Hernandez Jimenez and K. Goseva-Popstojanova, The Effect of Network Flows-based Features and Training Set Size on Malware Detection , 17th IEEE International Symposium on Network Computing and Applications (NCA 2018), Nov 2018, Cambridge, MA.
- K. Goseva-Popstojanova and J. Tyo, Identification of Security related Bug Reports via Text Mining using Supervised and Unsupervised Classification , 18th IEEE Conference on Quality, Reliability, and Security (QRS 2018), July 2018, Lisbon, Portugal, pp. 344-355.
- R. A. Bridges, J. M. Hernandez Jimenez, J. A. Nichols, K. Goseva-Popstojanova, and S. Prowell, Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics , 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-18), New York, August 2018, pp. 1680-1684.
- K. Goseva-Popstojanova and J. Tyo, Security Vulnerability Profiles of Mission Critical Software: Empirical Analysis of Security Related Bug Reports , 28th IEEE International Symposium on Software Reliability Engineering (ISSRE 2017), Toulouse, France, October 2017, pp. 152 - 163.
- J. M. Hernandez Jimenez, J. A. Nichols, K. Goseva-Popstojanova, S. Prowell, and R. A. Bridges, Malware Detection on General-Purpose Computers Using Power Consumption Monitoring: A Proof of Concept and Case Study , Technical Report, April 2017.
- J. M. Hernandez Jimenez, R. A. Bridges, J. A. Nichols, K. Goseva-Popstojanova, and S. Prowell, Towards a Malware Detection Framework Based on Power Consumption Monitoring , 37th IEEE Symposium in Security and Privacy, (Poster) May 2016, San Jose, CA
- R. C. Borges Hink and K. Goseva-Popstojanova, Characterization of Cyberattacks aimed at Integrated Industrial Control and Enterprise Systems: A case study , 17th IEEE International Symposium on High Assurance Systems Engineering (HASE 2016), Orlando, FL, Jan. 2016, pp. 149-156.
- K. Goseva-Popstojanova and Andrei Perhinschi, , On the performance of static code analysis for detection of security vulnerabilities, Information and Software Technology, Elsevier, Vol. 68, pp. 18-33, 2015
- K. Goseva-Popstojanova, G. Anastasovski, A. Dimitrijevikj, R. Pantev, B. Miller, Characterization and Classification of Malicious Web Traffic Computers & Security, Elsevier, Vol. 42, May 2014, pp. 92-115. DOI: 10.1016/j.cose.2014.01.006
- G. Anastasovski and K. Goseva-Popstojanova,
Classification of Partially Labeled Malicious Web Traffic in the Presence of Concept Drift
8th IEEE International Conference on Software Security and Reliability Companion (SERE-C 2014), Trustworthy Computing Workshop, San Francisco, June 30 - July 2 2014, pp. 130-139.
- K. Goseva-Popstojanova and A. Dimitrijevikj,
Distinguishing between Web Attacks and Vulnerability Scans based on Behavioral Characteristics
28th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA-2014), 7th International Workshop on Bio and Intelligent Computing (BICom-2014), Victoria, Canada, May 2014, pp. 42-48.
- K. Goseva-Popstojanova, G. Anastasovski and R. Pantev,
Using Multiclass Machine Learning Methods to Classify Malicious Behaviors Aimed at Web Systems
23rd IEEE International Symposium on Software Reliability Engineering (ISSRE 2012), Dallas TX, Nov 27-30, 2012, pp. 81-90
- K. Goseva-Popstojanova, G. Anastasovski and R. Pantev,
Classification of Malicious Web Sessions
21st IEEE International Conference on Computer Communication Networks (ICCCN 2012), Munich, Germany, July 30-Aug. 2, 2012, pp. 1-9
- K. Goseva-Popstojanova, R. Pantev, A. Dimitrijevikj and B. Miller, Quantification of Attackers Activities on Servers running
Web 2.0 Applications, 9th IEEE International Symposium on Network Computing and Applications (NCA 2010), Cambridge, MA, July 2010.
- K. Goseva-Popstojanova, B. Miller, R. Pantev, and A. Dimitrijevikj, Empirical Analysis of Attackers' Activity on Multi-Tier Web Systems ,
24th IEEE International Conference on Advanced Information Networking and Applications (AINA-10), Pert, Australia, April 2010.
- B. Madan, K. Goseva-Popstojanova, K. Vaidyanathan and K. S. Trivedi, A Method for Modeling and
Quantifying the Security Attributes of Intrusion Tolerant Systems, Performance Evaluation Journal, Vol. 56, No. 1-4, 2004, pp. 167-186.
- B.B.Madan, K. Goseva-Popstojanova, K. Vaidyanathan and K. S. Trivedi, Modeling and Quantification of Security Attributes of Software
Systems, 2002 International Conference on Dependable Systems & Networks (DSN 2002), IEEE International Performance and
Dependability Symposium (IPDS 2002) track, Washington, DC, June 2002, pp. 505-514.
- K. Goseva-Popstojanova, F.Wang, R.Wang, F.Gong, K. Vaidyanathan and K. S. Trivedi and B. Muthusamy, Characterizing Intrusion Tolerant Systems Using a State Transition Model, DARPA Information Survivability Conference and Exposition II (DISCEX II), Anaheim, California, June 2001, Vol.II, pp.211-221.
- F. Wang, F. Gong, C. Sargor, K. Goseva-Popstojanova, K. S. Trivedi and F. Jou, SITAR: A Scalable Intrusion Tolerant Architecture for Distributed Services, 2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop, West Point, New York, June 2001.
|