Journal Article Cyber SA: Situational Awareness for Cyber Defense 2010 • Advances in Information Security • 46:3-14 Barford P, Dacier M, Dietterich TG, Fredrikson M, Giffin J, Jajodia S, Jha S, Li J, Liu P, Ning P, Ou X, Song D, Strater L, Swarup V, Tadda G, Wang C, Yen J
Chapter Mining Large Information Networks by Graph Summarization 2010 • LINK MINING: MODELS, ALGORITHMS, AND APPLICATIONS • 475-501 Chen C, Lin CX, Fredrikson M, Christodorescu M, Yan X, Han J
Conference Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors 2010 • IEEE Symposium on Security and Privacy: Proceedings • 45-60 Fredrikson M, Jha S, Christodorescu M, Sailer R, Yan X
Journal Article Mining graph patterns efficiently via randomized summaries 2009 • Proceedings of the VLDB Endowment • 2(1):742-753 Chen C, Lin CX, Fredrikson M, Christodorescu M, Yan X, Han J
Conference A Layered Architecture for Detecting Malicious Behaviors 2008 • Lecture Notes in Computer Science • 5230:78-+ Martignoni L, Stinson E, Fredrikson M, Jha S, Mitchell JC