|
Search the dblp DataBase
Darren Mutz:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Forest Fisher, Tara A. Estlin, Darren Mutz, Steve A. Chien
Using Artificial Intelligence Planning to Generate Antenna Tracking Plans. [Citation Graph (0, 0)][DBLP] AAAI/IAAI, 1999, pp:856-863 [Conf]
- Darren Mutz, Giovanni Vigna, Richard A. Kemmerer
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:374-383 [Conf]
- Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur
Bayesian Event Classification for Intrusion Detection. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:14-23 [Conf]
- Fredrik Valeur, Darren Mutz, Giovanni Vigna
A Learning-Based Approach to the Detection of SQL Attacks. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:123-140 [Conf]
- Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna
On the Detection of Anomalous System Call Arguments. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:326-343 [Conf]
- Tara A. Estlin, Rebecca Castaño, Ashley Davies, Darren Mutz, Gregg Rabideau, Steve A. Chien, Eric Mjolsness
Goal-Directed Scientific Exploration Using Multiple Rovers. [Citation Graph (0, 0)][DBLP] FLAIRS Conference, 2001, pp:33-37 [Conf]
- Tara A. Estlin, Forest Fisher, Darren Mutz, Steve A. Chien
Automated Planning for a Deep Space Communications Station. [Citation Graph (0, 0)][DBLP] ICRA, 1999, pp:1410-0 [Conf]
- William K. Robertson, Christopher Krügel, Darren Mutz, Fredrik Valeur
Run-time Detection of Heap-based Overflows. [Citation Graph (0, 0)][DBLP] LISA, 2003, pp:51-60 [Conf]
- Steve A. Chien, Andre Stechert, Darren Mutz
On Efficient Heuristic Ranking of Hypotheses. [Citation Graph (0, 0)][DBLP] NIPS, 1997, pp:- [Conf]
- Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur
Topology-Based Detection of Anomalous BGP Messages. [Citation Graph (0, 0)][DBLP] RAID, 2003, pp:17-35 [Conf]
- Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna
Polymorphic Worm Detection Using Structural Information of Executables. [Citation Graph (0, 0)][DBLP] RAID, 2005, pp:207-226 [Conf]
- Steve A. Chien, Andre Stechert, Darren Mutz
Efficient Heuristic Hypothesis Ranking. [Citation Graph (0, 0)][DBLP] J. Artif. Intell. Res. (JAIR), 1999, v:10, n:, pp:375-397 [Journal]
- Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel
Anomalous system call detection. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:1, pp:61-93 [Journal]
- Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer
Exploiting Execution Context for the Detection of Anomalous System Calls. [Citation Graph (0, 0)][DBLP] RAID, 2007, pp:1-20 [Conf]
Search in 0.002secs, Finished in 0.002secs
|