Search the dblp DataBase
Karl N. Levitt :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Lawrence Robinson , Karl N. Levitt Proof Techniques for Hierarchically Structured Programs. [Citation Graph (3, 0)][DBLP ] Commun. ACM, 1977, v:20, n:4, pp:271-283 [Journal ] Dustin Lee , Jeff Rowe , Calvin Ko , Karl N. Levitt Detecting and Defending against Web-Server Fingerprinting. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:321-332 [Conf ] Karl N. Levitt Intrusion Detection: Current Capabilities and Future Directions. [Citation Graph (0, 0)][DBLP ] ACSAC, 2002, pp:365-370 [Conf ] Tye Stallard , Karl N. Levitt Automated Analysis for Digital Forensic Science: Semantic Integrity Checking. [Citation Graph (0, 0)][DBLP ] ACSAC, 2003, pp:160-169 [Conf ] Calvin Ko , Deborah A. Frincke , Terrance Goan , Todd Heberlein , Karl N. Levitt , Biswanath Mukherjee , Christopher Wee Analysis of an Algorithm for Distributed Recognition and Accountability. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:154-164 [Conf ] Lynette Qu Nguyen , Tufan Demir , Jeff Rowe , Francis Hsu , Karl N. Levitt A framework for diversifying windows native APIs to tolerate code injection attacks. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:392-394 [Conf ] Chinyang Henry Tseng , Shiau-Huey Wang , Karl N. Levitt DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:395-397 [Conf ] Raymond W. Yip , Karl N. Levitt Data Level Inference Detection in Database Systems. [Citation Graph (0, 0)][DBLP ] CSFW, 1998, pp:179-189 [Conf ] Christina Yip Chung , Michael Gertz , Karl N. Levitt Discovery of Multi-Level Security Policies. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:173-184 [Conf ] Raymond W. Yip , Karl N. Levitt The Design and Implementation of a Data Level Database Inference Detection System. [Citation Graph (0, 0)][DBLP ] DBSec, 1998, pp:253-266 [Conf ] Ebrima N. Ceesay , Jingmin Zhou , Michael Gertz , Karl N. Levitt , Matt Bishop Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs. [Citation Graph (0, 0)][DBLP ] DIMVA, 2006, pp:1-16 [Conf ] Calvin Ko , Karl N. Levitt System Health and Intrusion Monitoring (SHIM): Project Summary. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:202-207 [Conf ] D. Nojiri , Jeff Rowe , Karl N. Levitt Cooperative Response Strategies for Large Scale Attack Mitigation. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:293-302 [Conf ] Steven Cheung , Karl N. Levitt A Formal-Specification Based Approach for Protecting the Domain Name System. [Citation Graph (0, 0)][DBLP ] DSN, 2000, pp:641-0 [Conf ] James C. Reynolds , James E. Just , Ed Lawson , Larry A. Clough , Ryan Maglich , Karl N. Levitt The Design and Implementation of an Intrusion Tolerant System. [Citation Graph (0, 0)][DBLP ] DSN, 2002, pp:285-292 [Conf ] Karl N. Levitt , Lawrence Robinson , Brad A. Silverberg Writing Simulatable Specifications in SPECIAL. [Citation Graph (0, 0)][DBLP ] The Use of Formal Specification of Software, 1979, pp:39-78 [Conf ] Mark Heckman , Karl N. Levitt Applying the Composition Principle to Verify a Hierarchy of Security Servers. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1998, pp:338-347 [Conf ] Cui Zhang , Brian R. Becker , Dave Peticolas , Mark Heckman , Karl N. Levitt , Ronald A. Olsson Verification of a Distributed Computing. [Citation Graph (0, 0)][DBLP ] HICSS (5), 1997, pp:252-261 [Conf ] Melissa Danforth , Karl N. Levitt Immune System Model for Detecting Web Server Attacks. [Citation Graph (0, 0)][DBLP ] ICMLA, 2003, pp:161-167 [Conf ] Peter G. Neumann , Richard J. Feiertag , Karl N. Levitt , Lawrence Robinson Software Development and Proofs of Multi-Level Security. [Citation Graph (0, 0)][DBLP ] ICSE, 1976, pp:421-428 [Conf ] John H. Wensley , M. W. Green , Karl N. Levitt , Robert E. Shostak The Design, Analysis, and Verification of the SIFT Fault-Tolerant System. [Citation Graph (0, 0)][DBLP ] ICSE, 1976, pp:458-469 [Conf ] Tao Song , Calvin Ko , Chinyang Henry Tseng , Poornima Balasubramanyam , Anant Chaudhary , Karl N. Levitt Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2005, pp:16-33 [Conf ] Daniel F. Sterne , Poornima Balasubramanyam , David Carman , Brett Wilson , Rajesh Talpade , Calvin Ko , Ravindra Balupari , Chin-Yang Tseng , Thomas F. Bowen , Karl N. Levitt , Jeff Rowe A General Cooperative Intrusion Detection Architecture for MANETs. [Citation Graph (0, 0)][DBLP ] IWIA, 2005, pp:57-70 [Conf ] Deborah A. Frincke , Myla Archer , Karl N. Levitt CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms. [Citation Graph (0, 0)][DBLP ] KBSE, 1991, pp:151-160 [Conf ] Richard J. Waldinger , Karl N. Levitt Reasoning About Programs. [Citation Graph (0, 0)][DBLP ] POPL, 1973, pp:169-182 [Conf ] Ivan Balepin , Sergei Maltsev , Jeff Rowe , Karl N. Levitt Using Specification-Based Intrusion Detection for Automated Response. [Citation Graph (0, 0)][DBLP ] RAID, 2003, pp:136-154 [Conf ] Christina Yip Chung , Michael Gertz , Karl N. Levitt Misuse Detection in Database Systems Through User Profiling. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Richard J. Feiertag , Stuart Staniford-Chen , Karl N. Levitt , Mark Heckman , Dave Peticolas , Rick Crawford , Lee Benzinger , Sue Rho , Stephen Wu Intrusion Detection Inter-component Adaptive Negotiation. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Tao Song , Calvin Ko , Jim Alves-Foss , Cui Zhang , Karl N. Levitt Formal Reasoning About Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] RAID, 2004, pp:278-295 [Conf ] Chinyang Henry Tseng , Tao Song , Poornima Balasubramanyam , Calvin Ko , Karl N. Levitt A Specification-Based Intrusion Detection Model for OLSR. [Citation Graph (0, 0)][DBLP ] RAID, 2005, pp:330-350 [Conf ] Chinyang Henry Tseng , Shiau-Huey Wang , Calvin Ko , Karl N. Levitt DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. [Citation Graph (0, 0)][DBLP ] RAID, 2006, pp:249-271 [Conf ] Marcus Tylutki , Karl N. Levitt Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. [Citation Graph (0, 0)][DBLP ] RAID, 2003, pp:1-16 [Conf ] James E. Just , James C. Reynolds , Larry A. Clough , Melissa Danforth , Karl N. Levitt , Ryan Maglich , Jeff Rowe Learning Unknown Attacks - A Start. [Citation Graph (0, 0)][DBLP ] RAID, 2002, pp:158-176 [Conf ] Calvin Ko , Paul Brutch , Jeff Rowe , Guy Tsafnat , Karl N. Levitt System Health and Intrusion Monitoring Using a Hierarchy of Constraints. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2001, pp:190-204 [Conf ] Chin-Yang Tseng , Poornima Balasubramanyam , Calvin Ko , Rattapon Limprasittiporn , Jeff Rowe , Karl N. Levitt A specification-based intrusion detection system for AODV. [Citation Graph (0, 0)][DBLP ] SASN, 2003, pp:125-134 [Conf ] Richard J. Feiertag , Karl N. Levitt , Lawrence Robinson Proving Multilevel Security of a System Design. [Citation Graph (0, 0)][DBLP ] SOSP, 1977, pp:57-65 [Conf ] Jim Alves-Foss , Karl N. Levitt Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1991, pp:122-135 [Conf ] L. Todd Herberlein , Gihan V. Dias , Karl N. Levitt , Biswanath Mukherjee , Jeff Wood , David Wolber A Network Security Monitor. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1990, pp:296-305 [Conf ] Calvin Ko , Manfred Ruschitzka , Karl N. Levitt Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1997, pp:175-187 [Conf ] Christina Yip Chung , Michael Gertz , Karl N. Levitt DEMIDS: A Misuse Detection System for Database Systems. [Citation Graph (0, 0)][DBLP ] IICIS, 1999, pp:159-178 [Conf ] Tej Arora , Tony Leung , Karl N. Levitt , E. Thomas Schubert , Phillip J. Windley Report on the UCD Microcoded Viper Verification Project. [Citation Graph (0, 0)][DBLP ] HUG, 1993, pp:239-252 [Conf ] Saraswati Kalvala , Myla Archer , Karl N. Levitt Implementation and Use of Annotations in HOL. [Citation Graph (0, 0)][DBLP ] TPHOLs, 1992, pp:407-426 [Conf ] William L. Harrison , Myla Archer , Karl N. Levitt A HOL Mechanisation of the Axiomatic Semantics of a Simple Distributed Programming Language. [Citation Graph (0, 0)][DBLP ] TPHOLs, 1992, pp:347-356 [Conf ] William L. Harrison , Karl N. Levitt Mechanizing Security in HOL. [Citation Graph (0, 0)][DBLP ] TPHOLs, 1991, pp:63-66 [Conf ] Mark Heckman , Cui Zhang , Brian R. Becker , Dave Peticolas , Karl N. Levitt , Ronald A. Olsson Towards Applying the Composition Principle to Verify a Microkernel Operating System. [Citation Graph (0, 0)][DBLP ] TPHOLs, 1996, pp:235-250 [Conf ] Jing Pan , Karl N. Levitt , Myla Archer , Saraswati Kalvala Towards a Formal Verification of a Floating Point Coprocessor and its Composition with a Central Processing Unit. [Citation Graph (0, 0)][DBLP ] TPHOLs, 1992, pp:427-447 [Conf ] Cui Zhang , Brian R. Becker , Mark Heckman , Karl N. Levitt , Ronald A. Olsson A Hierarchical Method for Reasoning about Distributed Programming Languages. [Citation Graph (0, 0)][DBLP ] TPHOLs, 1995, pp:385-400 [Conf ] Cui Zhang , Robert J. Shaw , Ronald A. Olsson , Karl N. Levitt , Myla Archer , Mark Heckman , Gregory D. Benson Mechanizing a Programming Logic for the Concurrent Programming Language microSR in HOL. [Citation Graph (0, 0)][DBLP ] HUG, 1993, pp:29-42 [Conf ] Matt Bishop , Bhume Bhumiratana , Rick Crawford , Karl N. Levitt How to Sanitize Data. [Citation Graph (0, 0)][DBLP ] WETICE, 2004, pp:217-222 [Conf ] Matt Bishop , Rick Crawford , Bhume Bhumiratana , Lisa Clark , Karl N. Levitt Some Problems in Sanitizing Network Data. [Citation Graph (0, 0)][DBLP ] WETICE, 2006, pp:307-312 [Conf ] Phillip A. Porras , Linda Briesemeister , Keith Skinner , Karl N. Levitt , Jeff Rowe , Yu-Cheng Allen Ting A hybrid quarantine defense. [Citation Graph (0, 0)][DBLP ] WORM, 2004, pp:73-82 [Conf ] Richard J. Waldinger , Karl N. Levitt Reasoning about Programs. [Citation Graph (0, 0)][DBLP ] Artif. Intell., 1974, v:5, n:3, pp:235-316 [Journal ] Ruzena Bajcsy , Terry Benzel , Matt Bishop , Robert Braden , Carla E. Brodley , Sonia Fahmy , Sally Floyd , W. Hardaker , Anthony D. Joseph , George Kesidis , Karl N. Levitt , Robert Lindell , Peng Liu , David Miller , Russ Mundy , Cliford Neuman , Ron Ostrenga , Vern Paxson , Phillip A. Porras , Catherine Rosenberg , J. Doug Tygar , Shankar Sastry , Daniel F. Sterne , Shyhtsun Felix Wu Cyber defense technology networking and evaluation. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:58-61 [Journal ] Karl N. Levitt , William H. Kautz Cellular Arrays for the Solution of Graph Problems. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1972, v:15, n:9, pp:789-801 [Journal ] Jay M. Spitzen , Karl N. Levitt , Lawrence Robinson An Example of Hierarchical Design and Proof. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1978, v:21, n:12, pp:1064-1075 [Journal ] Richard J. Feiertag , Stuart Staniford-Chen , Karl N. Levitt , Mark Heckman , Dave Peticolas , Rick Crawford , Lee Benzinger , Sue Rho , Stephen Wu Intrusion detection inter-component adaptive negotiation. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2000, v:34, n:4, pp:605-621 [Journal ] Raymond W. Lo , Karl N. Levitt , Ronald A. Olsson MCF: a malicious code filter. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1995, v:14, n:6, pp:541-566 [Journal ] James A. Hoagland , Raju Pandey , Karl N. Levitt Security Policy Specification Using a Graphical Approach [Citation Graph (0, 0)][DBLP ] CoRR, 1998, v:0, n:, pp:- [Journal ] Bernard Elspas , Karl N. Levitt , Richard J. Waldinger , Abraham Waksman An Assessment of Techniques for Proving Program Correctness. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1972, v:4, n:2, pp:97-147 [Journal ] Raymond W. Lo , Karl N. Levitt , Ronald A. Olsson Validation of Array Accesses: Integration of Flow Analysis and Program Verification Techniques. [Citation Graph (0, 0)][DBLP ] Softw. Test., Verif. Reliab., 1997, v:7, n:4, pp:201-227 [Journal ] Cui Zhang , Brian R. Becker , Dave Peticolas , Ronald A. Olsson , Karl N. Levitt LVT: A Layered Verification Technique for Distributed Computing Systems. [Citation Graph (0, 0)][DBLP ] Softw. Test., Verif. Reliab., 1999, v:9, n:2, pp:107-133 [Journal ] Cui Zhang , Ronald A. Olsson , Karl N. Levitt Formal Verification of a Programming Logic for a Distributed Programming Language. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1999, v:216, n:1-2, pp:213-235 [Journal ] Cynthia E. Irvine , Karl N. Levitt Trusted Hardware: Can It Be Trustworthy? [Citation Graph (0, 0)][DBLP ] DAC, 2007, pp:1-4 [Conf ] Rick Crawford , Matt Bishop , Bhume Bhumiratana , Lisa Clark , Karl N. Levitt Sanitization models and their limitations. [Citation Graph (0, 0)][DBLP ] NSPW, 2006, pp:41-56 [Conf ] Shiau-Huey Wang , Chinyang Henry Tseng , Karl N. Levitt , Matthew Bishop Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] RAID, 2007, pp:127-145 [Conf ] A study of the data commutation problems in a self-repairable multiprocessor. [Citation Graph (, )][DBLP ] Using Soft-Line Recursive Response to Improve Query Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. [Citation Graph (, )][DBLP ] Towards a framework for worm-defense evaluation. [Citation Graph (, )][DBLP ] Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities. [Citation Graph (, )][DBLP ] A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. [Citation Graph (, )][DBLP ] Search in 0.042secs, Finished in 0.045secs