The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Darren Mutz: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Forest Fisher, Tara A. Estlin, Darren Mutz, Steve A. Chien
    Using Artificial Intelligence Planning to Generate Antenna Tracking Plans. [Citation Graph (0, 0)][DBLP]
    AAAI/IAAI, 1999, pp:856-863 [Conf]
  2. Darren Mutz, Giovanni Vigna, Richard A. Kemmerer
    An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:374-383 [Conf]
  3. Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur
    Bayesian Event Classification for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:14-23 [Conf]
  4. Fredrik Valeur, Darren Mutz, Giovanni Vigna
    A Learning-Based Approach to the Detection of SQL Attacks. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:123-140 [Conf]
  5. Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna
    On the Detection of Anomalous System Call Arguments. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:326-343 [Conf]
  6. Tara A. Estlin, Rebecca Castaño, Ashley Davies, Darren Mutz, Gregg Rabideau, Steve A. Chien, Eric Mjolsness
    Goal-Directed Scientific Exploration Using Multiple Rovers. [Citation Graph (0, 0)][DBLP]
    FLAIRS Conference, 2001, pp:33-37 [Conf]
  7. Tara A. Estlin, Forest Fisher, Darren Mutz, Steve A. Chien
    Automated Planning for a Deep Space Communications Station. [Citation Graph (0, 0)][DBLP]
    ICRA, 1999, pp:1410-0 [Conf]
  8. William K. Robertson, Christopher Krügel, Darren Mutz, Fredrik Valeur
    Run-time Detection of Heap-based Overflows. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:51-60 [Conf]
  9. Steve A. Chien, Andre Stechert, Darren Mutz
    On Efficient Heuristic Ranking of Hypotheses. [Citation Graph (0, 0)][DBLP]
    NIPS, 1997, pp:- [Conf]
  10. Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur
    Topology-Based Detection of Anomalous BGP Messages. [Citation Graph (0, 0)][DBLP]
    RAID, 2003, pp:17-35 [Conf]
  11. Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna
    Polymorphic Worm Detection Using Structural Information of Executables. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:207-226 [Conf]
  12. Steve A. Chien, Andre Stechert, Darren Mutz
    Efficient Heuristic Hypothesis Ranking. [Citation Graph (0, 0)][DBLP]
    J. Artif. Intell. Res. (JAIR), 1999, v:10, n:, pp:375-397 [Journal]
  13. Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel
    Anomalous system call detection. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:1, pp:61-93 [Journal]
  14. Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer
    Exploiting Execution Context for the Detection of Anomalous System Calls. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:1-20 [Conf]

Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002