|
Search the dblp DataBase
Prahlad Fogla:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough
DSO: Dependable Signing Overlay. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:33-49 [Conf]
- Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan, Mustaque Ahamad
A Context-Aware Security Architecture for Emerging Applications. [Citation Graph (0, 0)][DBLP] ACSAC, 2002, pp:249-260 [Conf]
- Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
Measuring intrusion detection capability: an information-theoretic approach. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:90-101 [Conf]
- Prahlad Fogla, Wenke Lee
Evading network anomaly detection systems: formal reasoning and practical techniques. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:59-68 [Conf]
- Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] ESORICS, 2006, pp:527-546 [Conf]
- Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, Weibo Gong
Anomaly Detection Using Call Stack Information. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2003, pp:62-0 [Conf]
- Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul I. Sharif
MisleadingWorm Signature Generators Using Deliberate Noise Injection. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:17-31 [Conf]
- Prahlad Fogla, Wenke Lee
q-Gram Matching Using Tree Models. [Citation Graph (0, 0)][DBLP] IEEE Trans. Knowl. Data Eng., 2006, v:18, n:4, pp:433-447 [Journal]
McPAD: A multiple classifier system for accurate payload-based anomaly detection. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|