The SCEAS System
Navigation Menu

Search the dblp DataBase


Calvin Ko: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dustin Lee, Jeff Rowe, Calvin Ko, Karl N. Levitt
    Detecting and Defending against Web-Server Fingerprinting. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:321-332 [Conf]
  2. Calvin Ko, Deborah A. Frincke, Terrance Goan, Todd Heberlein, Karl N. Levitt, Biswanath Mukherjee, Christopher Wee
    Analysis of an Algorithm for Distributed Recognition and Accountability. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:154-164 [Conf]
  3. Calvin Ko
    System Health and Intrusion Monitoring: Technology Description. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:27-29 [Conf]
  4. Calvin Ko, Karl N. Levitt
    System Health and Intrusion Monitoring (SHIM): Project Summary. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:202-207 [Conf]
  5. Tao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt
    Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:16-33 [Conf]
  6. Daniel F. Sterne, Poornima Balasubramanyam, David Carman, Brett Wilson, Rajesh Talpade, Calvin Ko, Ravindra Balupari, Chin-Yang Tseng, Thomas F. Bowen, Karl N. Levitt, Jeff Rowe
    A General Cooperative Intrusion Detection Architecture for MANETs. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:57-70 [Conf]
  7. Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt
    Formal Reasoning About Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    RAID, 2004, pp:278-295 [Conf]
  8. Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt
    A Specification-Based Intrusion Detection Model for OLSR. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:330-350 [Conf]
  9. Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt
    DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:249-271 [Conf]
  10. Calvin Ko, Paul Brutch, Jeff Rowe, Guy Tsafnat, Karl N. Levitt
    System Health and Intrusion Monitoring Using a Hierarchy of Constraints. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:190-204 [Conf]
  11. Paul Brutch, Calvin Ko
    Challenges in Intrusion Detection for Wireless Ad-hoc Networks. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2003, pp:368-373 [Conf]
  12. Chin-Yang Tseng, Poornima Balasubramanyam, Calvin Ko, Rattapon Limprasittiporn, Jeff Rowe, Karl N. Levitt
    A specification-based intrusion detection system for AODV. [Citation Graph (0, 0)][DBLP]
    SASN, 2003, pp:125-134 [Conf]
  13. Calvin Ko
    Logic Induction of Valid Behavior Specifications for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:142-153 [Conf]
  14. Calvin Ko, Timothy Redmond
    Noninterference and Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:177-187 [Conf]
  15. Calvin Ko, Manfred Ruschitzka, Karl N. Levitt
    Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:175-187 [Conf]

  16. Measuring denial Of service. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002