The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ramkumar Chinchani: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusudhanan Chandrasekaran, Shambhu J. Upadhyaya
    RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:189-204 [Conf]
  2. Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Shambhu J. Upadhyaya
    Towards a Theory of Insider Threat Assessment. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:108-117 [Conf]
  3. Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya
    ARCHERR: Runtime Environment Driven Program Safety. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:385-406 [Conf]
  4. Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya
    Insecure Programming: How Culpable is a Language's Syntax? [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:158-163 [Conf]
  5. Ramkumar Chinchani, Shambhu J. Upadhyaya, Kevin A. Kwiat
    A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors. [Citation Graph (0, 0)][DBLP]
    IWIA, 2003, pp:25-36 [Conf]
  6. Ramkumar Chinchani, Eric van den Berg
    A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:284-308 [Conf]
  7. Shambhu J. Upadhyaya, Ramkumar Chinchani, Kevin A. Kwiat
    An Analytical Framework for Reasoning about Intrusions. [Citation Graph (0, 0)][DBLP]
    SRDS, 2001, pp:99-0 [Conf]
  8. Madhusudhanan Chandrasekaran, Ramkumar Chinchani, Shambhu J. Upadhyaya
    PHONEY: Mimicking User Response to Detect Phishing Attacks. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2006, pp:668-672 [Conf]
  9. Ramkumar Chinchani, Duc Ha, Anusha Iyer, Hung Q. Ngo, Shambhu J. Upadhyaya
    On the Hardness of Approximating the Min-Hack Problem. [Citation Graph (0, 0)][DBLP]
    J. Comb. Optim., 2005, v:9, n:3, pp:295-311 [Journal]

  10. Insider Threat Analysis Using Information-Centric Modeling. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002