Search the dblp DataBase
Calvin Ko :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dustin Lee , Jeff Rowe , Calvin Ko , Karl N. Levitt Detecting and Defending against Web-Server Fingerprinting. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:321-332 [Conf ] Calvin Ko , Deborah A. Frincke , Terrance Goan , Todd Heberlein , Karl N. Levitt , Biswanath Mukherjee , Christopher Wee Analysis of an Algorithm for Distributed Recognition and Accountability. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:154-164 [Conf ] Calvin Ko System Health and Intrusion Monitoring: Technology Description. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:27-29 [Conf ] Calvin Ko , Karl N. Levitt System Health and Intrusion Monitoring (SHIM): Project Summary. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:202-207 [Conf ] Tao Song , Calvin Ko , Chinyang Henry Tseng , Poornima Balasubramanyam , Anant Chaudhary , Karl N. Levitt Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2005, pp:16-33 [Conf ] Daniel F. Sterne , Poornima Balasubramanyam , David Carman , Brett Wilson , Rajesh Talpade , Calvin Ko , Ravindra Balupari , Chin-Yang Tseng , Thomas F. Bowen , Karl N. Levitt , Jeff Rowe A General Cooperative Intrusion Detection Architecture for MANETs. [Citation Graph (0, 0)][DBLP ] IWIA, 2005, pp:57-70 [Conf ] Tao Song , Calvin Ko , Jim Alves-Foss , Cui Zhang , Karl N. Levitt Formal Reasoning About Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] RAID, 2004, pp:278-295 [Conf ] Chinyang Henry Tseng , Tao Song , Poornima Balasubramanyam , Calvin Ko , Karl N. Levitt A Specification-Based Intrusion Detection Model for OLSR. [Citation Graph (0, 0)][DBLP ] RAID, 2005, pp:330-350 [Conf ] Chinyang Henry Tseng , Shiau-Huey Wang , Calvin Ko , Karl N. Levitt DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. [Citation Graph (0, 0)][DBLP ] RAID, 2006, pp:249-271 [Conf ] Calvin Ko , Paul Brutch , Jeff Rowe , Guy Tsafnat , Karl N. Levitt System Health and Intrusion Monitoring Using a Hierarchy of Constraints. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2001, pp:190-204 [Conf ] Paul Brutch , Calvin Ko Challenges in Intrusion Detection for Wireless Ad-hoc Networks. [Citation Graph (0, 0)][DBLP ] SAINT Workshops, 2003, pp:368-373 [Conf ] Chin-Yang Tseng , Poornima Balasubramanyam , Calvin Ko , Rattapon Limprasittiporn , Jeff Rowe , Karl N. Levitt A specification-based intrusion detection system for AODV. [Citation Graph (0, 0)][DBLP ] SASN, 2003, pp:125-134 [Conf ] Calvin Ko Logic Induction of Valid Behavior Specifications for Intrusion Detection. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:142-153 [Conf ] Calvin Ko , Timothy Redmond Noninterference and Intrusion Detection. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:177-187 [Conf ] Calvin Ko , Manfred Ruschitzka , Karl N. Levitt Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1997, pp:175-187 [Conf ] Measuring denial Of service. [Citation Graph (, )][DBLP ] Search in 0.045secs, Finished in 0.045secs