The SCEAS System
Navigation Menu

Search the dblp DataBase


Anup K. Ghosh: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Matt Bishop, Anup K. Ghosh, James A. Whittaker
    How Useful is Software Fault Injection for Evaluating the Security of COTS Products? [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:339-342 [Conf]
  2. Christoph C. Michael, Anup K. Ghosh
    Two State-based Approaches to Program-based Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:21-0 [Conf]
  3. Matthew Schmid, Frank Hill, Anup K. Ghosh
    Protecting Data from Malicious Software. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:199-208 [Conf]
  4. Anup K. Ghosh
    E-Commerce Security: No Silver Bullet. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:3-16 [Conf]
  5. Anup K. Ghosh, Aaron Schwartzbard
    Analyzing the Performance of Program Behavior Profiling for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:19-32 [Conf]
  6. Anup K. Ghosh, Matthew Schmid, Frank Hill
    Wrapping Windows NT Software for Robustness. [Citation Graph (0, 0)][DBLP]
    FTCS, 1999, pp:344-347 [Conf]
  7. Anup K. Ghosh, Aaron Schwartzbard, Michael Schatz
    Learning Program Behavior Profiles for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Workshop on Intrusion Detection and Network Monitoring, 1999, pp:51-62 [Conf]
  8. Christoph C. Michael, Anup K. Ghosh
    Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:66-79 [Conf]
  9. Aaron Schwartzbard, Anup K. Ghosh
    A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  10. Anup K. Ghosh, Christoph C. Michael, Michael Schatz
    A Real-Time Intrusion Detection System Based on Learning Program Behavior. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:93-109 [Conf]
  11. Anup K. Ghosh
    Certifying E-Commerce Software for Security. [Citation Graph (0, 0)][DBLP]
    WECWIS, 1999, pp:64-67 [Conf]
  12. Anup K. Ghosh, Tara M. Swaminatha
    Software security and privacy risks in mobile e-commerce. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:51-57 [Journal]
  13. Anup K. Ghosh, Jeffrey M. Voas
    Inoculating Software for Survivability. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:38-44 [Journal]
  14. Anup K. Ghosh, Chuck Howell, James A. Whittaker
    Building Software Securely from the Ground Up. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2002, v:19, n:1, pp:14-16 [Journal]
  15. Christoph C. Michael, Anup K. Ghosh
    Simple, state-based approaches to program-based anomaly detection. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2002, v:5, n:3, pp:203-237 [Journal]

  16. Efficiently tracking application interactions using lightweight virtualization. [Citation Graph (, )][DBLP]

  17. A Virtualization Architecture for In-Depth Kernel Isolation. [Citation Graph (, )][DBLP]

  18. SafeFox: A Safe Lightweight Virtual Browsing Environment. [Citation Graph (, )][DBLP]

  19. Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services. [Citation Graph (, )][DBLP]

  20. HyperCheck: A Hardware-Assisted Integrity Monitor. [Citation Graph (, )][DBLP]

  21. An Automated Approach for Identifying Potential Vulnerabilities in Software. [Citation Graph (, )][DBLP]

  22. Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites. [Citation Graph (, )][DBLP]

  23. TCP throughput enhancement in wired-cum-wireless network. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002