Sven Krasser’s Blog

Musings on technology, security, and sundries.

Talks and Publications

Talks

  1. Deeper Down the ML Rabbit Hole,” guest on the Down the Security Rabbithole podcast, September 2017.
  2. Straight Talk on Machine Learning – What the Marketing Department Doesn’t Want You to Know,” sponsored workshop, Black Hat USA 2017, Las Vegas, NV, July 2017.
  3. AI, Machine Learning and the Future of Cybersecurity,” panel with Sven Krasser, Alex Pinto, and Jisheng Wang, moderated by Demetrios “Laz” Lazarikos, BrightTalk webcast (video), July 2017.
  4. Practical Machine Learning in Information Security,” Microsoft Security Data Science Colloquium, Redmond, WA, June 2017.
  5. WannaCry Ransomware Attack: What You Need to Know & How to Protect Against It,” panel with Lance Cottrell, Brian Minick, and Sven Krasser, moderated by RJ Gazarek, BrightTalk webcast, June 2017.
  6. Cybersecurity Intelligence”, panel with Celeste Fralick, Michael Kounavis, Sven Krasser, John Brock, and David Mountain, moderated by Catherine Huang, International Joint Conference on Neural Networks 2017, Anchorage, AK, May 2017.
  7. The Truth about Machine Learning,” guest on the Down the Security Rabbithole podcast, April 2017.
  8. AI & Machine Learning in CyberSecurity. What Is the Difference?,” panel with Engin Akyol, Igor Baikalov, Stephan Jou, and Sven Krasser, moderated by Sean Martin, BrightTalk webcast, February 2017.
  9. Applications of AI to Operations,” panel with Jenelle Bray, David Burke, Max Kleiman-Weiner, Sven Krasser, and Harold Moss, moderated by Arunesh Sinha, AAAI-17 Workshop on Artificial Intelligence for Cyber Security (AICS), San Fransisco, CA, February 2017.
  10. Battling Unknown Malware with Machine Learning,” webcast, September 2016.
  11. A Sober Look at Machine Learning,” guest speaker at monthly Information Systems Security Association of Orange County meeting, Irvine, CA, July 2016.
  12. Machine Learning Demystified,” webcast with Dmitri Alperovitch, November 2014.
  13. Finding the Needle in the IP Stack,” RSA Conference 2010, San Francisco, CA, March 2010.
  14. “The End of the Internet as We Know It? Separating Reality From the Hype,” panel with Tom Cross, Dan Kaminsky, Sven Krasser, and Chris Lee, moderated by Dmitri Alperovitch, RSA Conference 2010, San Francisco, CA, March 2010.
  15. “Data Mining for Threats – How TrustedSource determines Reputation,” McAfee Focus 2009, Las Vegas, NV, October 2009.
  16. Computer Security Research in Atlanta,” Georgia Tech Symposium on Computing Systems and Technologies, Atlanta, GA, April 2008.

Patents

  1. Dmitri Alperovitch and Sven Krasser, “System and method for malware and network reputation correlation,” U.S. Patent 9,661,017, issued May 23, 2017.
  2. Dmitri Alperovitch, Nick Black, Jeremy Gould, Paul Judge, Sven Krasser, Phyllis Schneck, Yuchun Tang, Aarjav Trivedi, Lamar Willis, Weilai Yang, and Jonathan Zdziarski, “Detecting image spam,” U.S. Patent 9,544,272, issued January 10, 2017.
  3. Dmitri Alperovitch, George Kurtz, Dave Diehl, Sven Krasser, and Adam Meyers, “Social sharing of security information in a group,” U.S. Patent 9,292,881, issued March 22, 2016.
  4. Dmitri Alperovitch and Sven Krasser, “System and method for malware and network reputation correlation,” U.S. Patent 9,122,877, issued September 1, 2015.
  5. Dmitri Alperovitch, Zheng Bu, Dave Diehl, and Sven Krasser, “System and method for protocol fingerprinting and reputation correlation,” U.S. Patent 9,106,680, issued August 11, 2015.
  6. Dmitri Alperovitch, Tomo Foote-Lennox, Jeremy Gould, Paula Greve, Alejandro Hernandez, Paul Judge, Sven Krasser, Tim Lange, Phyllis Schneck, Martin Stecher, Yuchun Tang, Aarjav Trivedi, Lamar Willis, Weilai Yang, and Jonathan Zdziarski, “Multi-dimensional reputation scoring,” U.S. Patent 9,009,321, issued April 14, 2015.
  7. Sven Krasser, Dmitri Alperovitch, Martin Stecher, and Peter Borgolte, “Web hosted security system communication,” U.S. Patent 8,775,619, issued July 8, 2014.
  8. Dmitri Alperovitch, Nick Black, Jeremy Gould, Paul Judge, Sven Krasser, Phyllis Schneck, Yuchun Tang, Aarjav Trivedi, Lamar Willis, Weilai Yang, and Jonathan Zdziarski, “Detecting image spam,” U.S. Patent 8,763,114, issued June 24, 2014.
  9. Dmitri Alperovitch, Tomo Foote-Lennox, Jeremy Gould, Paula Greve, Alejandro Hernandez, Paul Judge, Sven Krasser, Tim Lange, Phyllis Schneck, Martin Stecher, Yuchun Tang, Aarjav Trivedi, Lamar Willis, Weilai Yang, and Jonathan Zdziarski, “Multi-dimensional reputation scoring,” U.S. Patent 8,762,537, issued June 24, 2014.
  10. Sven Krasser, Yuchun Tang, Yuanchen He, and Zhenyu Zhong, “Malware detection via reputation system,” U.S. Patent 8,719,939, issued May 6, 2014.
  11. Sven Krasser, Dmitri Alperovitch, Yuchun Tang, Yuanchen He, Jonathan Zdziarski, and Mark Gilbert, “Reputation management for network content classification,” U.S. Patent 8,719,352, issued May 6, 2014.
  12. Dmitri Alperovitch and Sven Krasser, “Reputation based message processing,” U.S. Patent 8,635,690, issued January 21, 2014.
  13. Dmitri Alperovitch, Paula Greve, Sven Krasser, and Tomo Foote-Lennox, “Adjusting filter or classification control settings,” U.S. Patent 8,621,559, issued December 31, 2013.
  14. Dmitri Alperovitch, Sven Krasser, Phyllis Schneck, Jonathan Torrez, “Prioritizing network traffic,” U.S. Patent 8,606,910, issued December 10, 2013.
  15. Dmitri Alperovitch, Sven Krasser, Paula Greve, Phyllis Schneck, Jonathan Torrez, “Prioritizing network traffic,” U.S. Patent 8,589,503, issued November 19, 2013.
  16. Paul Judge, Dmitri Alperovitch, Sven Krasser, Phyllis Schneck, Jonathan Zdziarksi, “Systems and methods for identifying potentially malicious messages,” U.S. Patent 8,578,480, issued November 5, 2013.
  17. Dmitri Alperovitch, Sven Krasser, Paul Judge, Lamar Willis, “Reputation based load balancing,” U.S. Patent 8,578,051, issued November 5, 2013.
  18. Dmitri Alperovitch, Tomo Foote-Lennox, Paula Greve, Paul Judge, Sven Krasser, Tim Lange, Phyllis Schneck, Martin Stecher, Yuchun Tang, and Jonathan Zdziarski, “Web reputation scoring,” U.S. Patent 8,561,167, issued October 15, 2013.
  19. Paul Judge, Dmitri Alperovitch, Matt Moyer, and Sven Krasser, “Systems and methods for classification of messaging entities,” U.S. Patent 8,549,611, issued October 1, 2013.
  20. Nitin Jyoti, Prabhat Singh, Zhenyu Zhong, Guy Roberts, Jeff Green, and Sven Krasser, “System, method, and computer program product for segmenting a database based, at least in part, on a prevalence associated with known objects included in the database,” U.S. Patent 8,306,988, issued November 6, 2012.
  21. Dmitri Alperovitch, Tomo Foote-Lennox, Jeremy Gould, Paula Greve, Alejandro Hernandez, Paul Judge, Sven Krasser, Tim Lange, Phyllis Schneck, Martin Stecher, Yuchun Tang, Aarjav Trivedi, Lamar Willis, Weilai Yang, and Jonathan Zdziarski, “Multi-dimensional reputation scoring,” U.S. Patent 8,214,497, issued July 3, 2012.
  22. Dmitri Alperovitch, Paula Greve, Sven Krasser, and Tomo Foote-Lennox, “Adjusting filter or classification control settings,” U.S. Patent 8,185,930, issued May 22, 2012.
  23. Dmitri Alperovitch, Paul Judge, Sven Krasser, Phyllis Schneck, Aarjav Trivedi, and Weilai Yang, “Reputation based connection throttling,” U.S. Patent 8,179,798, issued May 15, 2012.
  24. Paul Judge, Guru Rajan, Dmitri Alperovitch, Matt Moyer, and Sven Krasser, “Message profiling systems and methods,” U.S. Patent 8,132,250, issued March 6, 2012.
  25. Dmitri Alperovitch, Paula Greve, Paul Judge, Sven Krasser, and Phyllis Schneck, “Prioritizing network traffic,” U.S. Patent 8,045,458, issued October 25, 2011.
  26. Dmitri Alperovitch, Alejandro Hernandez, Paul Judge, Sven Krasser, Phyllis Schneck, Yuchun Tang, and Jonathan Zdziarski, “Correlation and analysis of entity attributes,” U.S. Patent 7,949,716, issued May 24, 2011.
  27. Dmitri Alperovitch, Alejandro Hernandez, Paul Judge, Sven Krasser, and Phyllis Schneck, “Aggregation of reputation data,” U.S. Patent 7,937,480, issued May 3, 2011.
  28. Paul Judge, Dmitri Alperovitch, Joel Caracciolo, Alejandro Hernandez, Sven Krasser, and Phyllis Schneck, “Methods and systems for exposing messaging reputation to an end user,” U.S. Patent 7,870,203, issued January 11, 2011.
  29. Dmitri Alperovitch, Sven Krasser, Paul Judge, and Lamar Willis, “Reputation based load balancing,” U.S. Patent 7,779,156, issued August 17, 2010.
  30. Paul Judge, Dmitri Alperovitch, Sven Krasser, Arasendran Sellakannu, and Lamar Willis, “Systems and methods for graphically displaying messaging traffic,” U.S. Patent 7,693,947, issued April 6, 2010.

Conference Publications

  1. Krasser, S., Meyer, B., & Crenshaw, P. (2015). Valkyrie: Behavioral Malware Detection using Global Kernel-level Telemetry Data. In Proceedings of the 2015 IEEE International Workshop on Machine Learning for Signal Processing.
    @inproceedings{krasser2015val,
      author = {Krasser, Sven and Meyer, Brett and Crenshaw, Patrick},
      title = {Valkyrie: Behavioral Malware Detection using Global Kernel-level Telemetry Data},
      booktitle = {Proceedings of the 2015 IEEE International Workshop on Machine Learning for Signal Processing},
      location = {Boston, MA, USA},
      month = sep,
      year = {2015},
      month_numeric = {9}
    }
    
  2. He, Y., Zhong, Z., Krasser, S., & Tang, Y. (2010). Mining DNS for Malicious Domain Registrations. In Proceedings of the 6th International Conference on Collaborative Computing (CollaborateCom 2010).
    @inproceedings{he2010min,
      author = {He, Yuanchen and Zhong, Zhenyu and Krasser, Sven and Tang, Yuchun},
      title = {Mining DNS for Malicious Domain Registrations},
      booktitle = {Proceedings of the 6th International Conference on Collaborative Computing (CollaborateCom 2010)},
      location = {Chicago, IL, USA},
      month = oct,
      year = {2010},
      month_numeric = {10}
    }
    
  3. Hao, S., Syed, N. A., Feamster, N., Gray, A., & Krasser, S. (2009). Detecting Spammers with SNARE: Spatio-Temporal Network-Level Automated Reputation Engine. In Proceedings of the 18th USENIX Security Symposium.
    @inproceedings{hao2009det,
      author = {Hao, Shuang and Syed, Nadeem Ahmed and Feamster, Nick and Gray, Alexander and Krasser, Sven},
      title = {Detecting Spammers with SNARE: Spatio-Temporal Network-Level Automated Reputation Engine},
      booktitle = {Proceedings of the 18th USENIX Security Symposium},
      location = {Montreal, Canada},
      month = aug,
      year = {2009},
      month_numeric = {8}
    }
    
  4. Tang, Y., He, Y., & Krasser, S. (2008). Highly Scalable SVM Modeling with Random Granulation for Spam Sender Detection. In Proceedings of the 7th International Conference on Machine Learning and Applications (ICMLA’08) (pp. 659–664).
    @inproceedings{tang2008hig,
      author = {Tang, Yuchun and He, Yuanchen and Krasser, Sven},
      title = {Highly Scalable {SVM} Modeling with Random Granulation for Spam Sender Detection},
      booktitle = {Proceedings of the 7th International Conference on Machine Learning and Applications (ICMLA'08)},
      location = {San Diego, CA, USA},
      pages = {659--664},
      year = {2008}
    }
    
  5. Tang, Y., Krasser, S., He, Y., Yang, W., & Alperovitch, D. (2008). Support Vector Machines and Random Forests Modeling for Spam Senders Behavior Analysis. In Proceedings of the IEEE Global Communications Conference (IEEE GLOBECOM 2008), Computer and Communications Network Security Symposium.
    @inproceedings{tang2007sup,
      author = {Tang, Yuchun and Krasser, Sven and He, Yuanchen and Yang, Weilai and Alperovitch, Dmitri},
      title = {Support Vector Machines and Random Forests Modeling for Spam Senders Behavior Analysis},
      booktitle = {Proceedings of the IEEE Global Communications Conference (IEEE GLOBECOM 2008), Computer and Communications Network Security Symposium},
      location = {New Orleans, LA, USA},
      year = {2008}
    }
    
  6. Alperovitch, D., Judge, P., Krasser, S., Schneck, P., & VandenBerg, D. (2007). Pump-n-dump for fun & profit: An in-depth look into stock spam and brokerage account compromise operations. In Virus Bulletin 2007.
    @inproceedings{alperovitch2007pum,
      author = {Alperovitch, Dmitri and Judge, Paul and Krasser, Sven and Schneck, Phyllis and VandenBerg, Dane},
      title = {Pump-n-dump for fun & profit: An in-depth look into stock spam and brokerage account compromise operations},
      booktitle = {Virus Bulletin 2007},
      location = {Vienna, Austria},
      month = sep,
      year = {2007},
      month_numeric = {9}
    }
    
  7. Krasser, S., Tang, Y., Gould, J., Alperovitch, D., & Judge, P. (2007). Identifying image spam based on header and file properties using C4.5 decision trees and support vector machine learning. In Proceedings of the 8th IEEE Systems, Man and Cybernetics Information Assurance Workshop (pp. 255–261).
    @inproceedings{krasser2007ide,
      author = {Krasser, Sven and Tang, Yuchun and Gould, Jeremy and Alperovitch, Dmitri and Judge, Paul},
      title = {Identifying image spam based on header and file properties using C4.5 decision trees and support vector machine learning},
      booktitle = {Proceedings of the 8th IEEE Systems, Man and Cybernetics Information Assurance Workshop},
      location = {West Point, NY, USA},
      pages = {255--261},
      year = {2007}
    }
    
  8. Alperovitch, D., Judge, P., & Krasser, S. Taxonomy of email reputation systems. In Proceedings of the First International Workshop on Trust and Reputation Management in Massively Distributed Computing Systems.
    @inproceedings{alperovitch2007tax,
      author = {Alperovitch, Dmitri and Judge, Paul and Krasser, Sven},
      title = {Taxonomy of email reputation systems},
      booktitle = {Proceedings of the First International Workshop on Trust and Reputation Management in Massively Distributed Computing Systems},
      misc = {invited paper}
    }
    
  9. Trivedi, A., Judge, P., & Krasser, S. (2007). Analyzing network and content characteristics of SPIM using honeypots. In Proceedings of the Third Workshop on Steps to Reducing Unwanted Traffic on the Internet (USENIX SRUTI).
    @inproceedings{trivedi2007ana,
      author = {Trivedi, Aarjav and Judge, Paul and Krasser, Sven},
      title = {Analyzing network and content characteristics of SPIM using honeypots},
      booktitle = {Proceedings of the Third Workshop on Steps to Reducing Unwanted Traffic on the Internet (USENIX SRUTI)},
      year = {2007}
    }
    
  10. Tang, Y., Krasser, S., Judge, P., & Zhang, Y.-Q. (2006). Fast and effective spam sender detection with granular SVM on highly imbalanced mail server behavior data. In Proceedings of the Second International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
    @inproceedings{tang2006fas,
      author = {Tang, Yuchun and Krasser, Sven and Judge, Paul and Zhang, Yan-Qing},
      title = {Fast and effective spam sender detection with granular SVM on highly imbalanced mail server behavior data},
      booktitle = {Proceedings of the Second International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)},
      location = {Atlanta, GA, USA},
      month = nov,
      year = {2006},
      month_numeric = {11}
    }
    
  11. Grizzard, J. B., Charles R. Simpson, J., Krasser, S., Owen, H. L., & Riley, G. F. (2005). Flow Based Observations from NETI@home and Honeynet Data. In Proceedings of the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop (pp. 244–251).
    @inproceedings{grizzard2005flo,
      author = {Grizzard, Julian B. and Charles R. Simpson, Jr. and Krasser, Sven and Owen, Henry L. and Riley, George F.},
      booktitle = {Proceedings of the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop},
      title = {Flow Based Observations from {NETI@home} and Honeynet Data},
      month = jun,
      location = {West Point, NY, USA},
      year = {2005},
      pages = {244--251},
      month_numeric = {6}
    }
    
  12. Krasser, S., Conti, G., Grizzard, J., Gribschaw, J., & Owen, H. (2005). Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization. In Proceedings of the sixth IEEE Systems, Man and Cybernetics Information Assurance Workshop (pp. 42–49).
    @inproceedings{krasser2005rea,
      author = {Krasser, Sven and Conti, Gregory and Grizzard, Julian and Gribschaw, Jeff and Owen, Henry},
      booktitle = {Proceedings of the sixth IEEE Systems, Man and Cybernetics Information Assurance Workshop},
      title = {Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization},
      month = jun,
      location = {West Point, NY, USA},
      year = {2005},
      pages = {42--49},
      month_numeric = {6}
    }
    
  13. Krasser, S., Owen, H., Sokol, J., Huth, H.-P., & Grimminger, J. (2005). Adaptive per-flow traffic engineering based on probe packet measurements. In Proceedings of the Communication Networks and Services Research Conference (pp. 131–136).
    @inproceedings{krasser2005ada,
      author = {Krasser, Sven and Owen, Henry and Sokol, Joachim and Huth, Hans-Peter and Grimminger, Jochen},
      title = {Adaptive per-flow traffic engineering based on probe packet measurements},
      booktitle = {Proceedings of the Communication Networks and Services Research Conference},
      pages = {131--136},
      month = may,
      year = {2005},
      month_numeric = {5}
    }
    
  14. Altunbasak, H., Krasser, S., Owen, H., Grimminger, J., Huth, H.-P., & Sokol, J. (2005). Securing layer 2 in local area networks. In Proceedings of the 4th International Conference on Networking (Vol. 2, pp. 699–706).
    @inproceedings{altunbasak2005sec,
      author = {Altunbasak, Hayriye and Krasser, Sven and Owen, Henry and Grimminger, Jochen and Huth, Hans-Peter and Sokol, Joachim},
      title = {Securing layer 2 in local area networks},
      booktitle = {Proceedings of the 4th International Conference on Networking},
      volume = {2},
      pages = {699--706},
      year = {2005}
    }
    
  15. Altunbasak, H., Krasser, S., Owen, H., Sokol, J., Grimminger, J., & Huth, H.-P. (2004). Addressing the weak link between layer 2 and layer 3 in the Internet architecture. In Proceedings of the IEEE International Conference on Local Computer Networks (pp. 417–418).
    @inproceedings{altunbasak2004add,
      author = {Altunbasak, Hayriye and Krasser, Sven and Owen, Henry and Sokol, Joachim and Grimminger, Jochen and Huth, Hans-Peter},
      title = {Addressing the weak link between layer 2 and layer 3 in the Internet architecture},
      booktitle = {Proceedings of the IEEE International Conference on Local Computer Networks},
      location = {Tampa, FL, USA},
      pages = {417--418},
      month = nov,
      year = {2004},
      month_numeric = {11}
    }
    
  16. Grizzard, J. B., Krasser, S., Owen, H. L., Dodson, E. R., & Conti, G. J. (2004). Towards an Approach for Automatically Repairing Compromised Network Systems. In Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (pp. 389–392).
    @inproceedings{grizzard2004tow,
      author = {Grizzard, Julian B. and Krasser, Sven and Owen, Henry L. and Dodson, Eric R. and Conti, Gregory J.},
      booktitle = {Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications},
      title = {Towards an Approach for Automatically Repairing Compromised Network Systems},
      month = aug,
      location = {Cambridge, MA, USA},
      year = {2004},
      pages = {389--392},
      month_numeric = {8}
    }
    
  17. Krasser, S., Owen, H., Grimminger, J., Huth, H.-P., & Sokol, J. (2004). Online traffic engineering and connection admission control based on path queue states. In Proceedings of IEEE SoutheastCon 2004 (pp. 255–260).
    @inproceedings{krasser2004onl,
      author = {Krasser, Sven and Owen, Henry and Grimminger, Jochen and Huth, Hans-Peter and Sokol, Joachim},
      title = {Online traffic engineering and connection admission control based on path queue states},
      booktitle = {Proceedings of IEEE SoutheastCon 2004},
      location = {Greensboro, NC, USA},
      pages = {255--260},
      month = mar,
      year = {2004},
      month_numeric = {3}
    }
    
  18. Krasser, S., Owen, H., Grimminger, J., Huth, H.-P., & Sokol, J. (2003). Probing available bandwidth in radio access networks. In Proceedings of the IEEE Global Communications Conference 2003 (Vol. 6, pp. 3437–3441).
    @inproceedings{krasser2003pro,
      author = {Krasser, Sven and Owen, Henry and Grimminger, Jochen and Huth, Hans-Peter and Sokol, Joachim},
      title = {Probing available bandwidth in radio access networks},
      booktitle = {Proceedings of the IEEE Global Communications Conference 2003},
      location = {San Francisco, CA, USA},
      volume = {6},
      pages = {3437--3441},
      month = dec,
      year = {2003},
      month_numeric = {12}
    }
    
  19. Krasser, S., Owen, H., Grimminger, J., Huth, H.-P., & Sokol, J. (2003). Distributed bandwidth reservation by probing for available bandwidth. In Proceedings of the IEEE International Conference on Networks 2003 (pp. 443–448).
    @inproceedings{krasser2003dis,
      author = {Krasser, Sven and Owen, Henry and Grimminger, Jochen and Huth, Hans-Peter and Sokol, Joachim},
      title = {Distributed bandwidth reservation by probing for available bandwidth},
      booktitle = {Proceedings of the IEEE International Conference on Networks 2003},
      location = {Sydney, Australia},
      pages = {443--448},
      month = sep,
      year = {2003},
      month_numeric = {9}
    }
    
  20. Krasser, S., Owen, H., Barlow, D., Grimminger, J., Huth, H.-P., & Sokol, J. (2003). Evaluation of the local state fair share bandwidth algorithm. In Proceedings of the International Conference on Telecommunications 2003 (Vol. 2, pp. 911–916).
    @inproceedings{krasser2003eva,
      author = {Krasser, Sven and Owen, Henry and Barlow, David and Grimminger, Jochen and Huth, Hans-Peter and Sokol, Joachim},
      title = {Evaluation of the local state fair share bandwidth algorithm},
      booktitle = {Proceedings of the International Conference on Telecommunications 2003},
      location = {Papeete, French Polynesia},
      volume = {2},
      pages = {911--916},
      month = feb,
      year = {2003},
      month_numeric = {2}
    }
    

Journal Publications

  1. Tang, Y., Zhang, Y.-Q., Chawla, N. V., & Krasser, S. (2009). SVMs Modeling for Highly Imbalanced Classification. IEEE Transactions on Systems, Man, and Cybernetics – Part B: Cybernetics, 39(1), 281–288.
    @article{tang2009svm,
      author = {Tang, Yuchun and Zhang, Yan-Qing and Chawla, Nitesh V. and Krasser, Sven},
      journal = {IEEE Transactions on Systems, Man, and Cybernetics -- Part B: Cybernetics},
      title = {SVMs Modeling for Highly Imbalanced Classification},
      volume = {39},
      number = {1},
      pages = {281--288},
      year = {2009}
    }
    
  2. Krasser, S., Owen, H., Sokol, J., Grimminger, J., & Huth, H.-P. (2007). Adaptive measurement-based traffic engineering in small differentiated services domains. European Transactions on Telecommunications, 18(1), 34–47.
    @article{krasser2007ada,
      author = {Krasser, Sven and Owen, Henry and Sokol, Joachim and Grimminger, Jochen and Huth, Hans-Peter},
      title = {Adaptive measurement-based traffic engineering in small differentiated services domains},
      journal = {European Transactions on Telecommunications},
      volume = {18},
      number = {1},
      pages = {34--47},
      month = jan,
      year = {2007},
      month_numeric = {1}
    }
    
  3. Krasser, S., Grizzard, J. B., Owen, H. L., & Levine, J. G. (2005). The Use of Honeynets to Increase Computer Network Security and User Awareness. Journal of Security Education, 1(2/3), 23–37.
    @article{krasser2005use,
      author = {Krasser, Sven and Grizzard, Julian B. and Owen, Henry L. and Levine, John G.},
      journal = {Journal of Security Education},
      title = {The Use of Honeynets to Increase Computer Network Security and User Awareness},
      number = {2/3},
      volume = {1},
      year = {2005},
      pages = {23--37}
    }
    
  4. Barlow, D., Vassiliou, V., Krasser, S., Owen, H., Grimminger, J., Huth, H.-P., & Sokol, J. (2005). Traffic engineering based on local states in Internet protocol-based radio access networks. Journal of Communications and Networks, 7(3), 377–384.
    @article{barlow2005tra,
      author = {Barlow, David and Vassiliou, Vasos and Krasser, Sven and Owen, Henry and Grimminger, Jochen and Huth, Hans-Peter and Sokol, Joachim},
      journal = {Journal of Communications and Networks},
      title = {Traffic engineering based on local states in Internet protocol-based radio access networks},
      number = {3},
      volume = {7},
      pages = {377--384},
      month = sep,
      year = {2005},
      month_numeric = {9}
    }
    

Miscellaneous Publications

  1. Tang, Y., Krasser, S., Alperovitch, D., & Judge, P. (2008). Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data. In Proceedings of the International Conference on Artificial Intelligence and Pattern Recognition 2008 (AIPR-08) (pp. 174–180).
    @inproceedings{tang2008spa,
      author = {Tang, Yuchun and Krasser, Sven and Alperovitch, Dmitri and Judge, Paul},
      title = {Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data},
      booktitle = {Proceedings of the International Conference on Artificial Intelligence and Pattern Recognition 2008 (AIPR-08)},
      location = {Orlando, FL, USA},
      pages = {174--180},
      year = {2008}
    }
    
  2. Tang, Y., He, Y., & Krasser, S. (2008). Web Spam Challenge 2008.
    @inproceedings{tang2008web,
      author = {Tang, Yuchun and He, Yuanchen and Krasser, Sven},
      title = {Web Spam Challenge 2008},
      month = apr,
      year = {2008},
      month_numeric = {4}
    }
    
  3. Tang, Y., He, Y., Krasser, S., & Judge, P. (2007). Web Spam Challenge 2008. In Proceedings of the Graph Labeling Workshop and Web Spam Challenge (GRAPHLAB 2007).
    @inproceedings{tang2007web,
      author = {Tang, Yuchun and He, Yuanchen and Krasser, Sven and Judge, Paul},
      title = {Web Spam Challenge 2008},
      booktitle = {Proceedings of the Graph Labeling Workshop and Web Spam Challenge (GRAPHLAB 2007)},
      location = {Warsaw, Poland},
      month = sep,
      year = {2007},
      month_numeric = {9}
    }
    
  4. Krasser, S. (2004, June). Adaptive measurement-based traffic engineering in packet-switched radio access networks (PhD thesis). Georgia Institute of Technology.
    @phdthesis{krasser2004ada,
      author = {Krasser, Sven},
      title = {Adaptive measurement-based traffic engineering in packet-switched radio access networks},
      school = {Georgia Institute of Technology},
      month = jun,
      year = {2004},
      month_numeric = {6}
    }
    

Articles

  1. Sven Krasser, “3 Questions to ask about Machine Learning in Cybersecurity,” CIO Dive, June 2017.
  2. Sven Krasser, “The Power of Machine Learning in Cybersecurity,” insideBIGDATA, November 2016.
  3. Sven Krasser and Dmitri Alperovitch, “Common Misconceptions about Machine Learning in Cybersecurity,” Information Management, May 2016.

CrowdStrike Blog Posts

  1. CrowdStrike Machine Learning and VirusTotal,” August 2016.
  2. Advanced Falconry: Seeking out the Prey with Machine Learning,” December 2014.
  3. Data Science & Machine Learning 101: Hunting the Unknown,” November 2014.