The SCEAS System
Navigation Menu

Search the dblp DataBase


Anil Somayaji: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji
    Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:104-121 [Conf]
  2. Yiru Li, Anil Somayaji
    Securing Email Archives through User Modeling. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:547-556 [Conf]
  3. Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov
    Highlights from the 2005 New Security Paradigms Workshop. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:393-396 [Conf]
  4. Stephanie Forrest, Anil Somayaji, David H. Ackley
    Building Diverse Computer Systems. [Citation Graph (0, 0)][DBLP]
    Workshop on Hot Topics in Operating Systems, 1997, pp:67-72 [Conf]
  5. Evan Hughes, Anil Somayaji
    Towards Network Awareness. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:113-124 [Conf]
  6. Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff
    A Sense of Self for Unix Processes. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:120-128 [Conf]
  7. Glenn Wurster, Paul C. van Oorschot, Anil Somayaji
    A Generic Attack on Checksumming-Based Software Tamper Resistance. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:127-138 [Conf]
  8. Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji
    Computer Immunology. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1997, v:40, n:10, pp:88-96 [Journal]
  9. Anil Somayaji
    How to Win and Evolutionary Arms Race. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:6, pp:70-72 [Journal]
  10. Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji
    Intrusion Detection Using Sequences of System Calls. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1998, v:6, n:3, pp:151-180 [Journal]
  11. Paul C. van Oorschot, Anil Somayaji, Glenn Wurster
    Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:82-92 [Journal]
  12. Kenneth L. Ingham, Anil Somayaji, John Burge, Stephanie Forrest
    Learning DFA representations of HTTP for protecting web applications. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:5, pp:1239-1255 [Journal]

  13. The Evolution of System-Call Monitoring. [Citation Graph (, )][DBLP]

  14. SOMA: mutual approval for included content in web pages. [Citation Graph (, )][DBLP]

  15. Object-level recombination of commodity applications. [Citation Graph (, )][DBLP]

  16. Discovering Packet Structure through Lightweight Hierarchical Clustering. [Citation Graph (, )][DBLP]

  17. NetADHICT: A Tool for Understanding Network Traffic. [Citation Graph (, )][DBLP]

  18. A methodology for designing accurate anomaly detection systems. [Citation Graph (, )][DBLP]

Search in 0.006secs, Finished in 0.007secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002