|
Search the dblp DataBase
Anup K. Ghosh:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Matt Bishop, Anup K. Ghosh, James A. Whittaker
How Useful is Software Fault Injection for Evaluating the Security of COTS Products? [Citation Graph (0, 0)][DBLP] ACSAC, 2001, pp:339-342 [Conf]
- Christoph C. Michael, Anup K. Ghosh
Two State-based Approaches to Program-based Anomaly Detection. [Citation Graph (0, 0)][DBLP] ACSAC, 2000, pp:21-0 [Conf]
- Matthew Schmid, Frank Hill, Anup K. Ghosh
Protecting Data from Malicious Software. [Citation Graph (0, 0)][DBLP] ACSAC, 2002, pp:199-208 [Conf]
- Anup K. Ghosh
E-Commerce Security: No Silver Bullet. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:3-16 [Conf]
- Anup K. Ghosh, Aaron Schwartzbard
Analyzing the Performance of Program Behavior Profiling for Intrusion Detection. [Citation Graph (0, 0)][DBLP] DBSec, 1999, pp:19-32 [Conf]
- Anup K. Ghosh, Matthew Schmid, Frank Hill
Wrapping Windows NT Software for Robustness. [Citation Graph (0, 0)][DBLP] FTCS, 1999, pp:344-347 [Conf]
- Anup K. Ghosh, Aaron Schwartzbard, Michael Schatz
Learning Program Behavior Profiles for Intrusion Detection. [Citation Graph (0, 0)][DBLP] Workshop on Intrusion Detection and Network Monitoring, 1999, pp:51-62 [Conf]
- Christoph C. Michael, Anup K. Ghosh
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 2000, pp:66-79 [Conf]
- Aaron Schwartzbard, Anup K. Ghosh
A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
- Anup K. Ghosh, Christoph C. Michael, Michael Schatz
A Real-Time Intrusion Detection System Based on Learning Program Behavior. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 2000, pp:93-109 [Conf]
- Anup K. Ghosh
Certifying E-Commerce Software for Security. [Citation Graph (0, 0)][DBLP] WECWIS, 1999, pp:64-67 [Conf]
- Anup K. Ghosh, Tara M. Swaminatha
Software security and privacy risks in mobile e-commerce. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2001, v:44, n:2, pp:51-57 [Journal]
- Anup K. Ghosh, Jeffrey M. Voas
Inoculating Software for Survivability. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1999, v:42, n:7, pp:38-44 [Journal]
- Anup K. Ghosh, Chuck Howell, James A. Whittaker
Building Software Securely from the Ground Up. [Citation Graph (0, 0)][DBLP] IEEE Software, 2002, v:19, n:1, pp:14-16 [Journal]
- Christoph C. Michael, Anup K. Ghosh
Simple, state-based approaches to program-based anomaly detection. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:3, pp:203-237 [Journal]
Efficiently tracking application interactions using lightweight virtualization. [Citation Graph (, )][DBLP]
A Virtualization Architecture for In-Depth Kernel Isolation. [Citation Graph (, )][DBLP]
SafeFox: A Safe Lightweight Virtual Browsing Environment. [Citation Graph (, )][DBLP]
Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services. [Citation Graph (, )][DBLP]
HyperCheck: A Hardware-Assisted Integrity Monitor. [Citation Graph (, )][DBLP]
An Automated Approach for Identifying Potential Vulnerabilities in Software. [Citation Graph (, )][DBLP]
Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites. [Citation Graph (, )][DBLP]
TCP throughput enhancement in wired-cum-wireless network. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|