pith. machine review for the scientific record. sign in

Robert A. Bridges

Identifiers

No identifiers captured yet.

Papers (20)

  1. SoK: Honeypots & LLMs, More Than the Sum of Their Parts? cs.CR · 2025 · author #1
  2. Active Manifolds: A non-linear analogue to Active Subspaces stat.ML · 2019 · author #1
  3. Towards a CAN IDS based on a neural-network data field predictor cs.CR · 2018 · author #2
  4. How do information security workers use host data? A summary of interviews with security analysts cs.HC · 2018 · author #1
  5. ACTT: Automotive CAN Tokenization and Translation cs.OH · 2018 · author #2
  6. Defining a Metric Space of Host Logs and Operational Use Cases stat.AP · 2018 · author #2
  7. Exploiting the Shape of CAN Data for In-Vehicle Intrusion Detection cs.CR · 2018 · author #2
  8. EGBTER: Capturing degree distribution, clustering coefficients, and community structure in a single random graph model cs.SI · 2018 · author #3
  9. Forming IDEAS Interactive Data Exploration & Analysis System cs.CR · 2018 · author #1
  10. A Survey of Intrusion Detection Systems Leveraging Host Data cs.CR · 2018 · author #5
  11. Dimension Reduction Using Active Manifolds cs.LG · 2018 · author #1
  12. Setting the threshold for high throughput detectors: A mathematical approach for ensembles of dynamic, heterogeneous, probabilistic anomaly detectors cs.CR · 2017 · author #1
  13. Automated Behavioral Analysis of Malware A Case Study of WannaCry Ransomware cs.CR · 2017 · author #2
  14. Malware Detection on General-Purpose Computers Using Power Consumption Monitoring: A Proof of Concept and Case Study cs.CR · 2017 · author #5
  15. GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection cs.CR · 2016 · author #2
  16. Towards a relation extraction framework for cyber-security concepts cs.IR · 2015 · author #2
  17. Multi-Level Anomaly Detection on Time-Varying Graph Data cs.SI · 2014 · author #1
  18. Automatic Labeling for Entity Extraction in Cyber Security cs.IR · 2013 · author #1
  19. PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts cs.IR · 2013 · author #2
  20. A Solution to Schroeder's Equation in Several Variables math.CV · 2011 · author #1

Mentions

No mention provenance yet.

Frequent Coauthors