Additional German articles are listed separately.

Talks

  1. Keynote: “Navigating the Future: the Transformative Impact of AI on Business Operations,” DATCON 2023, Houston, TX, October 2023.
  2. Security and Compliance in the Era of LLMs: a Primer for Business Leaders on Responsible Adoption and Public Policy Considerations,” Sven Krasser, Drew Bagley, and Jeanne Miller-Romero, Fal.Con 2023, Las Vegas, NV, September 2023.
  3. “AI Myths and Realities: Navigating Global Regulation to Enhance Your Cybersecurity Program,” panel with Drew Bagley and Sven Krasser, moderated by Christoph Bausewein, Fal.Con 2022, Las Vegas, NV, September 2022.
  4. “Cybersecurity Industry Trends of Today and Tomorrow,” panel with Walid Rjaibi, Ram Venugopalan, Sven Krasser, and Kathy Bellew, moderated by Prasad Calyam, 14th Central Area Networking and Security Workshop (CANSec 2021), November 2021.
  5. “Practical Considerations and Best Practices for Measurement and Evaluation,” panel with Matt Gaston, Sven Krasser, Sanjeev Mohindra, Jane Pinelis, and Richard Tatum, moderated by William Steilein, NIST AI Measurement and Evaluation Workshop, June 2021.
  6. “Of Search Lights and Blind Spots: Machine Learning in Cybersecurity,” Robustness of AI Systems Against Adversarial Attacks (RAISA3), August 2020.
  7. Currently Deployed AI/ML Tools for Cyber Defense Operations,” panel with Sven Krasser, Dave Baggett, and Alex Kantchelian, moderated by John Manferdelli, Workshop on the Implications of Artificial Intelligence and Machine Learning for Cybersecurity; National Academies of Sciences, Engineering, and Medicine; Washington, DC, March 2019.
  8. Tales from the Trenches: Machine Learning in Practice,” sponsored session with Sven Krasser, Marian Radu, and Brett Meyer, Black Hat USA 2018, Las Vegas, NV, August 2018.
  9. AI in Security, Gaps Between Theory and Practice. Demonstrating Value to Customers,” panel with Adam Hunt, Sven Krasser, Sean Park, and Kelly Shortridge, moderated by Aleatha Parker-Wood, USENIX ScAINet 2018, Atlanta, GA, May 2018.
  10. Fundamentals of Machine Learning: Perspectives from a Data Scientist”, ISC West, Las Vegas, NV, April 2018.
  11. “Beyond the Hype: Machine Learning in Practice,” Sven Krasser and Marian Radu, Fal.Con Unite 2017, San Diego, CA, November 2017.
  12. From Theory to Product,” panel with Phil Roth, Peter Silberman, Sven Krasser, and Alex Pinto, moderated by Hyrum Anderson, CAMLIS 2017, Arlington, VA, October 2017.
  13. Straight Talk on Machine Learning – What the Marketing Department Doesn’t Want You to Know,” sponsored workshop, Black Hat USA 2017, Las Vegas, NV, July 2017.
  14. Practical Machine Learning in Information Security,” Microsoft Security Data Science Colloquium, Redmond, WA, June 2017.
  15. Cybersecurity Intelligence”, panel with Celeste Fralick, Michael Kounavis, Sven Krasser, John Brock, and David Mountain, moderated by Catherine Huang, International Joint Conference on Neural Networks 2017, Anchorage, AK, May 2017.
  16. Applications of AI to Operations,” panel with Jenelle Bray, David Burke, Max Kleiman-Weiner, Sven Krasser, and Harold Moss, moderated by Arunesh Sinha, AAAI-17 Workshop on Artificial Intelligence for Cyber Security (AICS), San Fransisco, CA, February 2017.
  17. A Sober Look at Machine Learning,” guest speaker at monthly Information Systems Security Association of Orange County meeting, Irvine, CA, July 2016.
  18. Finding the Needle in the IP Stack,” RSA Conference 2010, San Francisco, CA, March 2010.
  19. “The End of the Internet as We Know It? Separating Reality From the Hype,” panel with Tom Cross, Dan Kaminsky, Sven Krasser, and Chris Lee, moderated by Dmitri Alperovitch, RSA Conference 2010, San Francisco, CA, March 2010.
  20. “Data Mining for Threats – How TrustedSource determines Reputation,” McAfee Focus 2009, Las Vegas, NV, October 2009.
  21. Computer Security Research in Atlanta,” Georgia Tech Symposium on Computing Systems and Technologies, Atlanta, GA, April 2008.

Webcasts and Podcasts

  1. Generative AI Accelerates Protection and Investigation,” webcast with Scott Simkin and Sven Krasser, January 2024.
  2. “ChatGPT in Cyber Security- Opportunities and Challenges,” panel with Tan Kian Hua, Alex Polyakov, and Sven Krasser, moderated by Ajay Kumar, ISACA Singapore Chapter webinar, April 2023.
  3. Fun with Machines Learning,” guest on the Down the Security Rabbithole podcast, November 2022.
  4. Sven Krasser, CrowdStrike; CrowdStrike Fal.Con 2022,” guest on theCUBE, September 2022.
  5. Man Algorithm Machine,” guest on the Down the Security Rabbithole podcast, October 2020.
  6. Scaling Data Science & Defending Machine Learning,” guest on the Security Voices podcast, March 2020.
  7. Going Far Beyond Antivirus,” webcast with Dan Larson, Sven Krasser, Kirby Koster, and Jen Ayers, June 2018.
  8. Deeper Down the ML Rabbit Hole,” guest on the Down the Security Rabbithole podcast, September 2017.
  9. AI, Machine Learning and the Future of Cybersecurity,” panel with Sven Krasser, Alex Pinto, and Jisheng Wang, moderated by Demetrios “Laz” Lazarikos, BrightTalk webcast (video), July 2017.
  10. WannaCry Ransomware Attack: What You Need to Know & How to Protect Against It,” panel with Lance Cottrell, Brian Minick, and Sven Krasser, moderated by RJ Gazarek, BrightTalk webcast, June 2017.
  11. The Truth about Machine Learning,” guest on the Down the Security Rabbithole podcast, April 2017.
  12. AI & Machine Learning in CyberSecurity. What Is the Difference?,” panel with Engin Akyol, Igor Baikalov, Stephan Jou, and Sven Krasser, moderated by Sean Martin, BrightTalk webcast, February 2017.
  13. Battling Unknown Malware with Machine Learning,” webcast, September 2016.
  14. Machine Learning Demystified,” webcast with Dmitri Alperovitch and Sven Krasser, November 2014.

Patents

  1. Sven Krasser, David Elkind, Brett Meyer, and Patrick Crenshaw, “Validation-based determination of computational models,” U.S. Patent 11,811,821, issued November 7, 2023.
  2. Adam Meyers, Dmitri Alperovitch, George Kurtz, Hyacinth Diehl, and Sven Krasser, “Deception-based responses to security attacks,” U.S. Patent 11,809,555, issued November 7, 2023.
  3. Sven Krasser, David Elkind, Patrick Crenshaw, and Brett Meyer, “Computational modeling and classification of data streams,” U.S. Patent 10,832,168, issued November 10, 2020.
  4. Sven Krasser, David Elkind, Brett Meyer, and Patrick Crenshaw, “Validation-based determination of computational models,” U.S. Patent 10,826,934, issued November 3, 2020.
  5. Sven Krasser, David Elkind, Patrick Crenshaw, Kirby Koster, “Malware detection using local computational models,” U.S. Patent 10,726,128, issued July 28, 2020.
  6. Adam Meyers, Dmitri Alperovitch, George Kurtz, Hyacinth Diehl, and Sven Krasser, “Deception-based responses to security attacks,” U.S. Patent 10,713,356, issued July 14, 2020.
  7. Dmitri Alperovitch, Martin Stecher, Yuchun Tang, Aarjav Trivedi, Lamar Willis, Weilai Yang, Jonathan Zdziarski, Tomo Foote-Lennox, Jeremy Gould, Paula Greve, Alejandro Hernandez, Paul Judge, Sven Krasser, Tim Lange, and Phyllis Schneck, “Multi-dimensional reputation scoring,” U.S. Patent 10,050,917, issued August 14, 2018.
  8. Dmitri Alperovitch, George Kurtz, Hyacinth Diehl, Sven Krasser, and Adam Meyers, “Social sharing of security information in a group,” U.S. Patent 9,858,626, issued January 2, 2018.
  9. Dmitri Alperovitch and Sven Krasser, “System and method for malware and network reputation correlation,” U.S. Patent 9,661,017, issued May 23, 2017.
  10. Dmitri Alperovitch, Nick Black, Jeremy Gould, Paul Judge, Sven Krasser, Phyllis Schneck, Yuchun Tang, Aarjav Trivedi, Lamar Willis, Weilai Yang, and Jonathan Zdziarski, “Detecting image spam,” U.S. Patent 9,544,272, issued January 10, 2017.
  11. Dmitri Alperovitch, George Kurtz, Hyacinth Diehl, Sven Krasser, and Adam Meyers, “Social sharing of security information in a group,” U.S. Patent 9,292,881, issued March 22, 2016.
  12. Dmitri Alperovitch and Sven Krasser, “System and method for malware and network reputation correlation,” U.S. Patent 9,122,877, issued September 1, 2015.
  13. Dmitri Alperovitch, Zheng Bu, Hyacinth Diehl, and Sven Krasser, “System and method for protocol fingerprinting and reputation correlation,” U.S. Patent 9,106,680, issued August 11, 2015.
  14. Dmitri Alperovitch, Tomo Foote-Lennox, Jeremy Gould, Paula Greve, Alejandro Hernandez, Paul Judge, Sven Krasser, Tim Lange, Phyllis Schneck, Martin Stecher, Yuchun Tang, Aarjav Trivedi, Lamar Willis, Weilai Yang, and Jonathan Zdziarski, “Multi-dimensional reputation scoring,” U.S. Patent 9,009,321, issued April 14, 2015.
  15. Sven Krasser, Dmitri Alperovitch, Martin Stecher, and Peter Borgolte, “Web hosted security system communication,” U.S. Patent 8,775,619, issued July 8, 2014.
  16. Dmitri Alperovitch, Nick Black, Jeremy Gould, Paul Judge, Sven Krasser, Phyllis Schneck, Yuchun Tang, Aarjav Trivedi, Lamar Willis, Weilai Yang, and Jonathan Zdziarski, “Detecting image spam,” U.S. Patent 8,763,114, issued June 24, 2014.
  17. Dmitri Alperovitch, Tomo Foote-Lennox, Jeremy Gould, Paula Greve, Alejandro Hernandez, Paul Judge, Sven Krasser, Tim Lange, Phyllis Schneck, Martin Stecher, Yuchun Tang, Aarjav Trivedi, Lamar Willis, Weilai Yang, and Jonathan Zdziarski, “Multi-dimensional reputation scoring,” U.S. Patent 8,762,537, issued June 24, 2014.
  18. Sven Krasser, Yuchun Tang, Yuanchen He, and Zhenyu Zhong, “Malware detection via reputation system,” U.S. Patent 8,719,939, issued May 6, 2014.
  19. Sven Krasser, Dmitri Alperovitch, Yuchun Tang, Yuanchen He, Jonathan Zdziarski, and Mark Gilbert, “Reputation management for network content classification,” U.S. Patent 8,719,352, issued May 6, 2014.
  20. Dmitri Alperovitch and Sven Krasser, “Reputation based message processing,” U.S. Patent 8,635,690, issued January 21, 2014.
  21. Dmitri Alperovitch, Paula Greve, Sven Krasser, and Tomo Foote-Lennox, “Adjusting filter or classification control settings,” U.S. Patent 8,621,559, issued December 31, 2013.
  22. Dmitri Alperovitch, Sven Krasser, Phyllis Schneck, Jonathan Torrez, “Prioritizing network traffic,” U.S. Patent 8,606,910, issued December 10, 2013.
  23. Dmitri Alperovitch, Sven Krasser, Paula Greve, Phyllis Schneck, Jonathan Torrez, “Prioritizing network traffic,” U.S. Patent 8,589,503, issued November 19, 2013.
  24. Paul Judge, Dmitri Alperovitch, Sven Krasser, Phyllis Schneck, Jonathan Zdziarksi, “Systems and methods for identifying potentially malicious messages,” U.S. Patent 8,578,480, issued November 5, 2013.
  25. Dmitri Alperovitch, Sven Krasser, Paul Judge, Lamar Willis, “Reputation based load balancing,” U.S. Patent 8,578,051, issued November 5, 2013.
  26. Dmitri Alperovitch, Tomo Foote-Lennox, Paula Greve, Paul Judge, Sven Krasser, Tim Lange, Phyllis Schneck, Martin Stecher, Yuchun Tang, and Jonathan Zdziarski, “Web reputation scoring,” U.S. Patent 8,561,167, issued October 15, 2013.
  27. Paul Judge, Dmitri Alperovitch, Matt Moyer, and Sven Krasser, “Systems and methods for classification of messaging entities,” U.S. Patent 8,549,611, issued October 1, 2013.
  28. Nitin Jyoti, Prabhat Singh, Zhenyu Zhong, Guy Roberts, Jeff Green, and Sven Krasser, “System, method, and computer program product for segmenting a database based, at least in part, on a prevalence associated with known objects included in the database,” U.S. Patent 8,306,988, issued November 6, 2012.
  29. Dmitri Alperovitch, Tomo Foote-Lennox, Jeremy Gould, Paula Greve, Alejandro Hernandez, Paul Judge, Sven Krasser, Tim Lange, Phyllis Schneck, Martin Stecher, Yuchun Tang, Aarjav Trivedi, Lamar Willis, Weilai Yang, and Jonathan Zdziarski, “Multi-dimensional reputation scoring,” U.S. Patent 8,214,497, issued July 3, 2012.
  30. Dmitri Alperovitch, Paula Greve, Sven Krasser, and Tomo Foote-Lennox, “Adjusting filter or classification control settings,” U.S. Patent 8,185,930, issued May 22, 2012.
  31. Dmitri Alperovitch, Paul Judge, Sven Krasser, Phyllis Schneck, Aarjav Trivedi, and Weilai Yang, “Reputation based connection throttling,” U.S. Patent 8,179,798, issued May 15, 2012.
  32. Paul Judge, Guru Rajan, Dmitri Alperovitch, Matt Moyer, and Sven Krasser, “Message profiling systems and methods,” U.S. Patent 8,132,250, issued March 6, 2012.
  33. Dmitri Alperovitch, Paula Greve, Paul Judge, Sven Krasser, and Phyllis Schneck, “Prioritizing network traffic,” U.S. Patent 8,045,458, issued October 25, 2011.
  34. Dmitri Alperovitch, Alejandro Hernandez, Paul Judge, Sven Krasser, Phyllis Schneck, Yuchun Tang, and Jonathan Zdziarski, “Correlation and analysis of entity attributes,” U.S. Patent 7,949,716, issued May 24, 2011.
  35. Dmitri Alperovitch, Alejandro Hernandez, Paul Judge, Sven Krasser, and Phyllis Schneck, “Aggregation of reputation data,” U.S. Patent 7,937,480, issued May 3, 2011.
  36. Paul Judge, Dmitri Alperovitch, Joel Caracciolo, Alejandro Hernandez, Sven Krasser, and Phyllis Schneck, “Methods and systems for exposing messaging reputation to an end user,” U.S. Patent 7,870,203, issued January 11, 2011.
  37. Dmitri Alperovitch, Sven Krasser, Paul Judge, and Lamar Willis, “Reputation based load balancing,” U.S. Patent 7,779,156, issued August 17, 2010.
  38. Paul Judge, Dmitri Alperovitch, Sven Krasser, Arasendran Sellakannu, and Lamar Willis, “Systems and methods for graphically displaying messaging traffic,” U.S. Patent 7,693,947, issued April 6, 2010.

Conference Publications

  1. Krasser, S., Meyer, B., & Crenshaw, P. (2015, September). Valkyrie: Behavioral Malware Detection using Global Kernel-level Telemetry Data. Proceedings of the 2015 IEEE International Workshop on Machine Learning for Signal Processing.
    @inproceedings{krasser2015val,
      author = {Krasser, Sven and Meyer, Brett and Crenshaw, Patrick},
      title = {Valkyrie: Behavioral Malware Detection using Global Kernel-level Telemetry Data},
      booktitle = {Proceedings of the 2015 IEEE International Workshop on Machine Learning for Signal Processing},
      location = {Boston, MA, USA},
      month = sep,
      year = {2015}
    }
    
  2. He, Y., Zhong, Z., Krasser, S., & Tang, Y. (2010, October). Mining DNS for Malicious Domain Registrations. Proceedings of the 6th International Conference on Collaborative Computing (CollaborateCom 2010).
    @inproceedings{he2010min,
      author = {He, Yuanchen and Zhong, Zhenyu and Krasser, Sven and Tang, Yuchun},
      title = {Mining DNS for Malicious Domain Registrations},
      booktitle = {Proceedings of the 6th International Conference on Collaborative Computing (CollaborateCom 2010)},
      location = {Chicago, IL, USA},
      month = oct,
      year = {2010}
    }
    
  3. Hao, S., Syed, N. A., Feamster, N., Gray, A., & Krasser, S. (2009, August). Detecting Spammers with SNARE: Spatio-Temporal Network-Level Automated Reputation Engine. Proceedings of the 18th USENIX Security Symposium.
    @inproceedings{hao2009det,
      author = {Hao, Shuang and Syed, Nadeem Ahmed and Feamster, Nick and Gray, Alexander and Krasser, Sven},
      title = {Detecting Spammers with SNARE: Spatio-Temporal Network-Level Automated Reputation Engine},
      booktitle = {Proceedings of the 18th USENIX Security Symposium},
      location = {Montreal, Canada},
      month = aug,
      year = {2009}
    }
    
  4. Tang, Y., He, Y., & Krasser, S. (2008). Highly Scalable SVM Modeling with Random Granulation for Spam Sender Detection. Proceedings of the 7th International Conference on Machine Learning and Applications (ICMLA’08), 659–664.
    @inproceedings{tang2008hig,
      author = {Tang, Yuchun and He, Yuanchen and Krasser, Sven},
      title = {Highly Scalable {SVM} Modeling with Random Granulation for Spam Sender Detection},
      booktitle = {Proceedings of the 7th International Conference on Machine Learning and Applications (ICMLA'08)},
      location = {San Diego, CA, USA},
      pages = {659--664},
      year = {2008}
    }
    
  5. Tang, Y., Krasser, S., He, Y., Yang, W., & Alperovitch, D. (2008). Support Vector Machines and Random Forests Modeling for Spam Senders Behavior Analysis. Proceedings of the IEEE Global Communications Conference (IEEE GLOBECOM 2008), Computer and Communications Network Security Symposium.
    @inproceedings{tang2007sup,
      author = {Tang, Yuchun and Krasser, Sven and He, Yuanchen and Yang, Weilai and Alperovitch, Dmitri},
      title = {Support Vector Machines and Random Forests Modeling for Spam Senders Behavior Analysis},
      booktitle = {Proceedings of the IEEE Global Communications Conference (IEEE GLOBECOM 2008), Computer and Communications Network Security Symposium},
      location = {New Orleans, LA, USA},
      year = {2008}
    }
    
  6. Alperovitch, D., Judge, P., Krasser, S., Schneck, P., & VandenBerg, D. (2007, September). Pump-n-dump for fun & profit: An in-depth look into stock spam and brokerage account compromise operations. Virus Bulletin 2007.
    @inproceedings{alperovitch2007pum,
      author = {Alperovitch, Dmitri and Judge, Paul and Krasser, Sven and Schneck, Phyllis and VandenBerg, Dane},
      title = {Pump-n-dump for fun & profit: An in-depth look into stock spam and brokerage account compromise operations},
      booktitle = {Virus Bulletin 2007},
      location = {Vienna, Austria},
      month = sep,
      year = {2007}
    }
    
  7. Krasser, S., Tang, Y., Gould, J., Alperovitch, D., & Judge, P. (2007). Identifying image spam based on header and file properties using C4.5 decision trees and support vector machine learning. Proceedings of the 8th IEEE Systems, Man and Cybernetics Information Assurance Workshop, 255–261.
    @inproceedings{krasser2007ide,
      author = {Krasser, Sven and Tang, Yuchun and Gould, Jeremy and Alperovitch, Dmitri and Judge, Paul},
      title = {Identifying image spam based on header and file properties using C4.5 decision trees and support vector machine learning},
      booktitle = {Proceedings of the 8th IEEE Systems, Man and Cybernetics Information Assurance Workshop},
      location = {West Point, NY, USA},
      pages = {255--261},
      year = {2007}
    }
    
  8. Alperovitch, D., Judge, P., & Krasser, S. Taxonomy of email reputation systems. Proceedings of the First International Workshop on Trust and Reputation Management in Massively Distributed Computing Systems.
    @inproceedings{alperovitch2007tax,
      author = {Alperovitch, Dmitri and Judge, Paul and Krasser, Sven},
      title = {Taxonomy of email reputation systems},
      booktitle = {Proceedings of the First International Workshop on Trust and Reputation Management in Massively Distributed Computing Systems},
      misc = {invited paper}
    }
    
  9. Trivedi, A., Judge, P., & Krasser, S. (2007). Analyzing network and content characteristics of SPIM using honeypots. Proceedings of the Third Workshop on Steps to Reducing Unwanted Traffic on the Internet (USENIX SRUTI).
    @inproceedings{trivedi2007ana,
      author = {Trivedi, Aarjav and Judge, Paul and Krasser, Sven},
      title = {Analyzing network and content characteristics of SPIM using honeypots},
      booktitle = {Proceedings of the Third Workshop on Steps to Reducing Unwanted Traffic on the Internet (USENIX SRUTI)},
      year = {2007}
    }
    
  10. Tang, Y., Krasser, S., Judge, P., & Zhang, Y.-Q. (2006, November). Fast and effective spam sender detection with granular SVM on highly imbalanced mail server behavior data. Proceedings of the Second International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
    @inproceedings{tang2006fas,
      author = {Tang, Yuchun and Krasser, Sven and Judge, Paul and Zhang, Yan-Qing},
      title = {Fast and effective spam sender detection with granular SVM on highly imbalanced mail server behavior data},
      booktitle = {Proceedings of the Second International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)},
      location = {Atlanta, GA, USA},
      month = nov,
      year = {2006}
    }
    
  11. Grizzard, J. B., Charles R. Simpson, J., Krasser, S., Owen, H. L., & Riley, G. F. (2005). Flow Based Observations from NETI@home and Honeynet Data. Proceedings of the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop, 244–251.
    @inproceedings{grizzard2005flo,
      author = {Grizzard, Julian B. and Charles R. Simpson, Jr. and Krasser, Sven and Owen, Henry L. and Riley, George F.},
      booktitle = {Proceedings of the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop},
      title = {Flow Based Observations from {NETI@home} and Honeynet Data},
      month = jun,
      location = {West Point, NY, USA},
      year = {2005},
      pages = {244--251}
    }
    
  12. Krasser, S., Conti, G., Grizzard, J., Gribschaw, J., & Owen, H. (2005). Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization. Proceedings of the Sixth IEEE Systems, Man and Cybernetics Information Assurance Workshop, 42–49.
    @inproceedings{krasser2005rea,
      author = {Krasser, Sven and Conti, Gregory and Grizzard, Julian and Gribschaw, Jeff and Owen, Henry},
      booktitle = {Proceedings of the sixth IEEE Systems, Man and Cybernetics Information Assurance Workshop},
      title = {Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization},
      month = jun,
      location = {West Point, NY, USA},
      year = {2005},
      pages = {42--49}
    }
    
  13. Krasser, S., Owen, H., Sokol, J., Huth, H.-P., & Grimminger, J. (2005). Adaptive per-flow traffic engineering based on probe packet measurements. Proceedings of the Communication Networks and Services Research Conference, 131–136.
    @inproceedings{krasser2005ada,
      author = {Krasser, Sven and Owen, Henry and Sokol, Joachim and Huth, Hans-Peter and Grimminger, Jochen},
      title = {Adaptive per-flow traffic engineering based on probe packet measurements},
      booktitle = {Proceedings of the Communication Networks and Services Research Conference},
      pages = {131--136},
      month = may,
      year = {2005}
    }
    
  14. Altunbasak, H., Krasser, S., Owen, H., Grimminger, J., Huth, H.-P., & Sokol, J. (2005). Securing layer 2 in local area networks. Proceedings of the 4th International Conference on Networking, 2, 699–706.
    @inproceedings{altunbasak2005sec,
      author = {Altunbasak, Hayriye and Krasser, Sven and Owen, Henry and Grimminger, Jochen and Huth, Hans-Peter and Sokol, Joachim},
      title = {Securing layer 2 in local area networks},
      booktitle = {Proceedings of the 4th International Conference on Networking},
      volume = {2},
      pages = {699--706},
      year = {2005}
    }
    
  15. Altunbasak, H., Krasser, S., Owen, H., Sokol, J., Grimminger, J., & Huth, H.-P. (2004). Addressing the weak link between layer 2 and layer 3 in the Internet architecture. Proceedings of the IEEE International Conference on Local Computer Networks, 417–418.
    @inproceedings{altunbasak2004add,
      author = {Altunbasak, Hayriye and Krasser, Sven and Owen, Henry and Sokol, Joachim and Grimminger, Jochen and Huth, Hans-Peter},
      title = {Addressing the weak link between layer 2 and layer 3 in the Internet architecture},
      booktitle = {Proceedings of the IEEE International Conference on Local Computer Networks},
      location = {Tampa, FL, USA},
      pages = {417--418},
      month = nov,
      year = {2004}
    }
    
  16. Grizzard, J. B., Krasser, S., Owen, H. L., Dodson, E. R., & Conti, G. J. (2004). Towards an Approach for Automatically Repairing Compromised Network Systems. Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications, 389–392.
    @inproceedings{grizzard2004tow,
      author = {Grizzard, Julian B. and Krasser, Sven and Owen, Henry L. and Dodson, Eric R. and Conti, Gregory J.},
      booktitle = {Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications},
      title = {Towards an Approach for Automatically Repairing Compromised Network Systems},
      month = aug,
      location = {Cambridge, MA, USA},
      year = {2004},
      pages = {389--392}
    }
    
  17. Krasser, S., Owen, H., Grimminger, J., Huth, H.-P., & Sokol, J. (2004). Online traffic engineering and connection admission control based on path queue states. Proceedings of IEEE SoutheastCon 2004, 255–260.
    @inproceedings{krasser2004onl,
      author = {Krasser, Sven and Owen, Henry and Grimminger, Jochen and Huth, Hans-Peter and Sokol, Joachim},
      title = {Online traffic engineering and connection admission control based on path queue states},
      booktitle = {Proceedings of IEEE SoutheastCon 2004},
      location = {Greensboro, NC, USA},
      pages = {255--260},
      month = mar,
      year = {2004}
    }
    
  18. Krasser, S., Owen, H., Grimminger, J., Huth, H.-P., & Sokol, J. (2003). Probing available bandwidth in radio access networks. Proceedings of the IEEE Global Communications Conference 2003, 6, 3437–3441.
    @inproceedings{krasser2003pro,
      author = {Krasser, Sven and Owen, Henry and Grimminger, Jochen and Huth, Hans-Peter and Sokol, Joachim},
      title = {Probing available bandwidth in radio access networks},
      booktitle = {Proceedings of the IEEE Global Communications Conference 2003},
      location = {San Francisco, CA, USA},
      volume = {6},
      pages = {3437--3441},
      month = dec,
      year = {2003}
    }
    
  19. Krasser, S., Owen, H., Grimminger, J., Huth, H.-P., & Sokol, J. (2003). Distributed bandwidth reservation by probing for available bandwidth. Proceedings of the IEEE International Conference on Networks 2003, 443–448.
    @inproceedings{krasser2003dis,
      author = {Krasser, Sven and Owen, Henry and Grimminger, Jochen and Huth, Hans-Peter and Sokol, Joachim},
      title = {Distributed bandwidth reservation by probing for available bandwidth},
      booktitle = {Proceedings of the IEEE International Conference on Networks 2003},
      location = {Sydney, Australia},
      pages = {443--448},
      month = sep,
      year = {2003}
    }
    
  20. Krasser, S., Owen, H., Barlow, D., Grimminger, J., Huth, H.-P., & Sokol, J. (2003). Evaluation of the local state fair share bandwidth algorithm. Proceedings of the International Conference on Telecommunications 2003, 2, 911–916.
    @inproceedings{krasser2003eva,
      author = {Krasser, Sven and Owen, Henry and Barlow, David and Grimminger, Jochen and Huth, Hans-Peter and Sokol, Joachim},
      title = {Evaluation of the local state fair share bandwidth algorithm},
      booktitle = {Proceedings of the International Conference on Telecommunications 2003},
      location = {Papeete, French Polynesia},
      volume = {2},
      pages = {911--916},
      month = feb,
      year = {2003}
    }
    

Journal Publications

  1. Tang, Y., Zhang, Y.-Q., Chawla, N. V., & Krasser, S. (2009). SVMs Modeling for Highly Imbalanced Classification. IEEE Transactions on Systems, Man, and Cybernetics – Part B: Cybernetics, 39(1), 281–288.
    @article{tang2009svm,
      author = {Tang, Yuchun and Zhang, Yan-Qing and Chawla, Nitesh V. and Krasser, Sven},
      journal = {IEEE Transactions on Systems, Man, and Cybernetics -- Part B: Cybernetics},
      title = {SVMs Modeling for Highly Imbalanced Classification},
      volume = {39},
      number = {1},
      pages = {281--288},
      year = {2009}
    }
    
  2. Krasser, S., Owen, H., Sokol, J., Grimminger, J., & Huth, H.-P. (2007). Adaptive measurement-based traffic engineering in small differentiated services domains. European Transactions on Telecommunications, 18(1), 34–47.
    @article{krasser2007ada,
      author = {Krasser, Sven and Owen, Henry and Sokol, Joachim and Grimminger, Jochen and Huth, Hans-Peter},
      title = {Adaptive measurement-based traffic engineering in small differentiated services domains},
      journal = {European Transactions on Telecommunications},
      volume = {18},
      number = {1},
      pages = {34--47},
      month = jan,
      year = {2007}
    }
    
  3. Krasser, S., Grizzard, J. B., Owen, H. L., & Levine, J. G. (2005). The Use of Honeynets to Increase Computer Network Security and User Awareness. Journal of Security Education, 1(2/3), 23–37.
    @article{krasser2005use,
      author = {Krasser, Sven and Grizzard, Julian B. and Owen, Henry L. and Levine, John G.},
      journal = {Journal of Security Education},
      title = {The Use of Honeynets to Increase Computer Network Security and User Awareness},
      number = {2/3},
      volume = {1},
      year = {2005},
      pages = {23--37}
    }
    
  4. Barlow, D., Vassiliou, V., Krasser, S., Owen, H., Grimminger, J., Huth, H.-P., & Sokol, J. (2005). Traffic engineering based on local states in Internet protocol-based radio access networks. Journal of Communications and Networks, 7(3), 377–384.
    @article{barlow2005tra,
      author = {Barlow, David and Vassiliou, Vasos and Krasser, Sven and Owen, Henry and Grimminger, Jochen and Huth, Hans-Peter and Sokol, Joachim},
      journal = {Journal of Communications and Networks},
      title = {Traffic engineering based on local states in Internet protocol-based radio access networks},
      number = {3},
      volume = {7},
      pages = {377--384},
      month = sep,
      year = {2005}
    }
    

Miscellaneous Publications

  1. Swire, P., Kennedy-Mayo, D. B., Bagley, D., Modak, A., Krasser, S., & Bausewein, C. (2023). Risks to Cybersecurity from Data Localization, Organized by Techniques, Tactics, and Procedures. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4466479
    @article{swire2023risk,
      author = {Swire, Peter and Kennedy-Mayo, DeBrae and Bagley, Drew and Modak, Avani and Krasser, Sven and Bausewein, Christoph},
      title = {Risks to Cybersecurity from Data Localization, Organized by Techniques, Tactics, and Procedures},
      month = jun,
      year = {2023},
      url = {https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4466479}
    }
    
  2. Tang, Y., Krasser, S., Alperovitch, D., & Judge, P. (2008). Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data. Proceedings of the International Conference on Artificial Intelligence and Pattern Recognition 2008 (AIPR-08), 174–180.
    @inproceedings{tang2008spa,
      author = {Tang, Yuchun and Krasser, Sven and Alperovitch, Dmitri and Judge, Paul},
      title = {Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data},
      booktitle = {Proceedings of the International Conference on Artificial Intelligence and Pattern Recognition 2008 (AIPR-08)},
      location = {Orlando, FL, USA},
      pages = {174--180},
      year = {2008}
    }
    
  3. Tang, Y., He, Y., & Krasser, S. (2008, April). Web Spam Challenge 2008.
    @inproceedings{tang2008web,
      author = {Tang, Yuchun and He, Yuanchen and Krasser, Sven},
      title = {Web Spam Challenge 2008},
      month = apr,
      year = {2008}
    }
    
  4. Tang, Y., He, Y., Krasser, S., & Judge, P. (2007, September). Web Spam Challenge 2008. Proceedings of the Graph Labeling Workshop and Web Spam Challenge (GRAPHLAB 2007).
    @inproceedings{tang2007web,
      author = {Tang, Yuchun and He, Yuanchen and Krasser, Sven and Judge, Paul},
      title = {Web Spam Challenge 2008},
      booktitle = {Proceedings of the Graph Labeling Workshop and Web Spam Challenge (GRAPHLAB 2007)},
      location = {Warsaw, Poland},
      month = sep,
      year = {2007}
    }
    
  5. Krasser, S. (2004). Adaptive measurement-based traffic engineering in packet-switched radio access networks [PhD thesis]. Georgia Institute of Technology.
    @phdthesis{krasser2004ada,
      author = {Krasser, Sven},
      title = {Adaptive measurement-based traffic engineering in packet-switched radio access networks},
      school = {Georgia Institute of Technology},
      month = jun,
      year = {2004}
    }
    

Articles

  1. Sven Krasser, “CISOs’ Most Common Concerns with Generative AI,” AI Business, February 2024.
  2. Sven Krasser, “CISOs’ Most Common Concerns with Generative AI,” Express Computer, October 2023.
  3. Sven Krasser, “Preparing for Adversarial Machine Learning Attacks,” Infosecurity Magazine, June 2023.
  4. Sven Krasser, “How the cloud makes cybersecurity stronger,” Securitysenses, December 2022.
  5. Sven Krasser, “Why it’s impossible to have autonomous security without humans,” SC Magazine, August 2022.
  6. Sven Krasser, “Why AI is now table-stakes in cybersecurity,” Digitalisation World, December 2021.
  7. Sven Krasser, “3 Questions to ask about Machine Learning in Cybersecurity,” CIO Dive, June 2017.
  8. Sven Krasser, “The Power of Machine Learning in Cybersecurity,” insideBIGDATA, November 2016.
  9. Sven Krasser and Dmitri Alperovitch, “Common Misconceptions about Machine Learning in Cybersecurity,” Information Management, May 2016.

CrowdStrike Blog Posts

  1. How Human Intelligence is Supercharging CrowdStrike’s Artificial Intelligence,” April 2022.
  2. Stellar Performances: How CrowdStrike Machine Learning Handles the SUNSPOT Malware,” January 2021.
  3. CrowdStrike Machine Learning and VirusTotal,” August 2016.
  4. Advanced Falconry: Seeking out the Prey with Machine Learning,” December 2014.
  5. Data Science & Machine Learning 101: Hunting the Unknown,” November 2014.