​
Login / Signup
Matt Wolff
Publication Activity (10 Years)
Years Active: 2010-2019
Publications (10 Years): 10
Top Topics
Wavelet Decomposition
Multiresolution
Random Projections
Malicious Code
Top Venues
CoRR
IEEE BigData
J. Innov. Digit. Ecosyst.
HICSS
</>
Publications
</>
Michael Wojnowicz
,
Di Zhang
,
Glenn Chisholm
,
Xuan Zhao
,
Matt Wolff
Projecting "better than randomly": How to reduce the dimensionality of very large datasets in a way that outperforms random projections.
CoRR
(2019)
Michael Wojnowicz
,
Glenn Chisholm
,
Brian Wallace
,
Matt Wolff
,
Xuan Zhao
,
Jay Luan
SUSPEND: Determining software suspiciousness by non-stationary time series modeling of entropy signals.
Expert Syst. Appl.
71 (2017)
Om Patri
,
Michael Wojnowicz
,
Matt Wolff
Discovering Malware with Time Series Shapelets.
HICSS
(2017)
Michael Wojnowicz
,
Glenn Chisholm
,
Matt Wolff
Suspiciously Structured Entropy: Wavelet Decomposition of Software Entropy Reveals Symptoms of Malware in the Energy Spectrum.
FLAIRS Conference
(2016)
Michael Wojnowicz
,
Di Zhang
,
Glenn Chisholm
,
Xuan Zhao
,
Matt Wolff
Projecting "Better Than Randomly": How to Reduce the Dimensionality of Very Large Datasets in a Way That Outperforms Random Projections.
DSAA
(2016)
Michael Wojnowicz
,
Ben Cruz
,
Xuan Zhao
,
Brian Wallace
,
Matt Wolff
,
Jay Luan
,
Caleb Crable
"Influence Sketching": Finding Influential Samples In Large-Scale Regressions.
CoRR
(2016)
Michael Wojnowicz
,
Glenn Chisholm
,
Matt Wolff
,
Xuan Zhao
Wavelet decomposition of software entropy reveals symptoms of malicious code.
J. Innov. Digit. Ecosyst.
3 (2) (2016)
Michael Wojnowicz
,
Glenn Chisholm
,
Matt Wolff
,
Xuan Zhao
Wavelet decomposition of software entropy reveals symptoms of malicious code.
CoRR
(2016)
Xuan Zhao
,
Jay Luan
,
Matt Wolff
Evaluating randomness in cyber attack textual artifacts.
eCrime
(2016)
Michael Wojnowicz
,
Ben Cruz
,
Xuan Zhao
,
Brian Wallace
,
Matt Wolff
,
Jay Luan
,
Caleb Crable
"Influence sketching": Finding influential samples in large-scale regressions.
IEEE BigData
(2016)
Matt Wolff
Behavioral Biometric Identification on Mobile Devices.
HCI (24)
(2013)
Matt Wolff
Unsupervised methods for detecting a malicious insider.
ISCRAM
(2010)