The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Karl N. Levitt: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lawrence Robinson, Karl N. Levitt
    Proof Techniques for Hierarchically Structured Programs. [Citation Graph (3, 0)][DBLP]
    Commun. ACM, 1977, v:20, n:4, pp:271-283 [Journal]
  2. Dustin Lee, Jeff Rowe, Calvin Ko, Karl N. Levitt
    Detecting and Defending against Web-Server Fingerprinting. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:321-332 [Conf]
  3. Karl N. Levitt
    Intrusion Detection: Current Capabilities and Future Directions. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:365-370 [Conf]
  4. Tye Stallard, Karl N. Levitt
    Automated Analysis for Digital Forensic Science: Semantic Integrity Checking. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:160-169 [Conf]
  5. Calvin Ko, Deborah A. Frincke, Terrance Goan, Todd Heberlein, Karl N. Levitt, Biswanath Mukherjee, Christopher Wee
    Analysis of an Algorithm for Distributed Recognition and Accountability. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:154-164 [Conf]
  6. Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis Hsu, Karl N. Levitt
    A framework for diversifying windows native APIs to tolerate code injection attacks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:392-394 [Conf]
  7. Chinyang Henry Tseng, Shiau-Huey Wang, Karl N. Levitt
    DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:395-397 [Conf]
  8. Raymond W. Yip, Karl N. Levitt
    Data Level Inference Detection in Database Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:179-189 [Conf]
  9. Christina Yip Chung, Michael Gertz, Karl N. Levitt
    Discovery of Multi-Level Security Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:173-184 [Conf]
  10. Raymond W. Yip, Karl N. Levitt
    The Design and Implementation of a Data Level Database Inference Detection System. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:253-266 [Conf]
  11. Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz, Karl N. Levitt, Matt Bishop
    Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2006, pp:1-16 [Conf]
  12. Calvin Ko, Karl N. Levitt
    System Health and Intrusion Monitoring (SHIM): Project Summary. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:202-207 [Conf]
  13. D. Nojiri, Jeff Rowe, Karl N. Levitt
    Cooperative Response Strategies for Large Scale Attack Mitigation. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:293-302 [Conf]
  14. Steven Cheung, Karl N. Levitt
    A Formal-Specification Based Approach for Protecting the Domain Name System. [Citation Graph (0, 0)][DBLP]
    DSN, 2000, pp:641-0 [Conf]
  15. James C. Reynolds, James E. Just, Ed Lawson, Larry A. Clough, Ryan Maglich, Karl N. Levitt
    The Design and Implementation of an Intrusion Tolerant System. [Citation Graph (0, 0)][DBLP]
    DSN, 2002, pp:285-292 [Conf]
  16. Karl N. Levitt, Lawrence Robinson, Brad A. Silverberg
    Writing Simulatable Specifications in SPECIAL. [Citation Graph (0, 0)][DBLP]
    The Use of Formal Specification of Software, 1979, pp:39-78 [Conf]
  17. Mark Heckman, Karl N. Levitt
    Applying the Composition Principle to Verify a Hierarchy of Security Servers. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:338-347 [Conf]
  18. Cui Zhang, Brian R. Becker, Dave Peticolas, Mark Heckman, Karl N. Levitt, Ronald A. Olsson
    Verification of a Distributed Computing. [Citation Graph (0, 0)][DBLP]
    HICSS (5), 1997, pp:252-261 [Conf]
  19. Melissa Danforth, Karl N. Levitt
    Immune System Model for Detecting Web Server Attacks. [Citation Graph (0, 0)][DBLP]
    ICMLA, 2003, pp:161-167 [Conf]
  20. Peter G. Neumann, Richard J. Feiertag, Karl N. Levitt, Lawrence Robinson
    Software Development and Proofs of Multi-Level Security. [Citation Graph (0, 0)][DBLP]
    ICSE, 1976, pp:421-428 [Conf]
  21. John H. Wensley, M. W. Green, Karl N. Levitt, Robert E. Shostak
    The Design, Analysis, and Verification of the SIFT Fault-Tolerant System. [Citation Graph (0, 0)][DBLP]
    ICSE, 1976, pp:458-469 [Conf]
  22. Tao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt
    Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:16-33 [Conf]
  23. Daniel F. Sterne, Poornima Balasubramanyam, David Carman, Brett Wilson, Rajesh Talpade, Calvin Ko, Ravindra Balupari, Chin-Yang Tseng, Thomas F. Bowen, Karl N. Levitt, Jeff Rowe
    A General Cooperative Intrusion Detection Architecture for MANETs. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:57-70 [Conf]
  24. Deborah A. Frincke, Myla Archer, Karl N. Levitt
    CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms. [Citation Graph (0, 0)][DBLP]
    KBSE, 1991, pp:151-160 [Conf]
  25. Richard J. Waldinger, Karl N. Levitt
    Reasoning About Programs. [Citation Graph (0, 0)][DBLP]
    POPL, 1973, pp:169-182 [Conf]
  26. Ivan Balepin, Sergei Maltsev, Jeff Rowe, Karl N. Levitt
    Using Specification-Based Intrusion Detection for Automated Response. [Citation Graph (0, 0)][DBLP]
    RAID, 2003, pp:136-154 [Conf]
  27. Christina Yip Chung, Michael Gertz, Karl N. Levitt
    Misuse Detection in Database Systems Through User Profiling. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  28. Richard J. Feiertag, Stuart Staniford-Chen, Karl N. Levitt, Mark Heckman, Dave Peticolas, Rick Crawford, Lee Benzinger, Sue Rho, Stephen Wu
    Intrusion Detection Inter-component Adaptive Negotiation. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  29. Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt
    Formal Reasoning About Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    RAID, 2004, pp:278-295 [Conf]
  30. Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt
    A Specification-Based Intrusion Detection Model for OLSR. [Citation Graph (0, 0)][DBLP]
    RAID, 2005, pp:330-350 [Conf]
  31. Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt
    DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. [Citation Graph (0, 0)][DBLP]
    RAID, 2006, pp:249-271 [Conf]
  32. Marcus Tylutki, Karl N. Levitt
    Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. [Citation Graph (0, 0)][DBLP]
    RAID, 2003, pp:1-16 [Conf]
  33. James E. Just, James C. Reynolds, Larry A. Clough, Melissa Danforth, Karl N. Levitt, Ryan Maglich, Jeff Rowe
    Learning Unknown Attacks - A Start. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:158-176 [Conf]
  34. Calvin Ko, Paul Brutch, Jeff Rowe, Guy Tsafnat, Karl N. Levitt
    System Health and Intrusion Monitoring Using a Hierarchy of Constraints. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:190-204 [Conf]
  35. Chin-Yang Tseng, Poornima Balasubramanyam, Calvin Ko, Rattapon Limprasittiporn, Jeff Rowe, Karl N. Levitt
    A specification-based intrusion detection system for AODV. [Citation Graph (0, 0)][DBLP]
    SASN, 2003, pp:125-134 [Conf]
  36. Richard J. Feiertag, Karl N. Levitt, Lawrence Robinson
    Proving Multilevel Security of a System Design. [Citation Graph (0, 0)][DBLP]
    SOSP, 1977, pp:57-65 [Conf]
  37. Jim Alves-Foss, Karl N. Levitt
    Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:122-135 [Conf]
  38. L. Todd Herberlein, Gihan V. Dias, Karl N. Levitt, Biswanath Mukherjee, Jeff Wood, David Wolber
    A Network Security Monitor. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:296-305 [Conf]
  39. Calvin Ko, Manfred Ruschitzka, Karl N. Levitt
    Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:175-187 [Conf]
  40. Christina Yip Chung, Michael Gertz, Karl N. Levitt
    DEMIDS: A Misuse Detection System for Database Systems. [Citation Graph (0, 0)][DBLP]
    IICIS, 1999, pp:159-178 [Conf]
  41. Tej Arora, Tony Leung, Karl N. Levitt, E. Thomas Schubert, Phillip J. Windley
    Report on the UCD Microcoded Viper Verification Project. [Citation Graph (0, 0)][DBLP]
    HUG, 1993, pp:239-252 [Conf]
  42. Saraswati Kalvala, Myla Archer, Karl N. Levitt
    Implementation and Use of Annotations in HOL. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 1992, pp:407-426 [Conf]
  43. William L. Harrison, Myla Archer, Karl N. Levitt
    A HOL Mechanisation of the Axiomatic Semantics of a Simple Distributed Programming Language. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 1992, pp:347-356 [Conf]
  44. William L. Harrison, Karl N. Levitt
    Mechanizing Security in HOL. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 1991, pp:63-66 [Conf]
  45. Mark Heckman, Cui Zhang, Brian R. Becker, Dave Peticolas, Karl N. Levitt, Ronald A. Olsson
    Towards Applying the Composition Principle to Verify a Microkernel Operating System. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 1996, pp:235-250 [Conf]
  46. Jing Pan, Karl N. Levitt, Myla Archer, Saraswati Kalvala
    Towards a Formal Verification of a Floating Point Coprocessor and its Composition with a Central Processing Unit. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 1992, pp:427-447 [Conf]
  47. Cui Zhang, Brian R. Becker, Mark Heckman, Karl N. Levitt, Ronald A. Olsson
    A Hierarchical Method for Reasoning about Distributed Programming Languages. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 1995, pp:385-400 [Conf]
  48. Cui Zhang, Robert J. Shaw, Ronald A. Olsson, Karl N. Levitt, Myla Archer, Mark Heckman, Gregory D. Benson
    Mechanizing a Programming Logic for the Concurrent Programming Language microSR in HOL. [Citation Graph (0, 0)][DBLP]
    HUG, 1993, pp:29-42 [Conf]
  49. Matt Bishop, Bhume Bhumiratana, Rick Crawford, Karl N. Levitt
    How to Sanitize Data. [Citation Graph (0, 0)][DBLP]
    WETICE, 2004, pp:217-222 [Conf]
  50. Matt Bishop, Rick Crawford, Bhume Bhumiratana, Lisa Clark, Karl N. Levitt
    Some Problems in Sanitizing Network Data. [Citation Graph (0, 0)][DBLP]
    WETICE, 2006, pp:307-312 [Conf]
  51. Phillip A. Porras, Linda Briesemeister, Keith Skinner, Karl N. Levitt, Jeff Rowe, Yu-Cheng Allen Ting
    A hybrid quarantine defense. [Citation Graph (0, 0)][DBLP]
    WORM, 2004, pp:73-82 [Conf]
  52. Richard J. Waldinger, Karl N. Levitt
    Reasoning about Programs. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 1974, v:5, n:3, pp:235-316 [Journal]
  53. Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu
    Cyber defense technology networking and evaluation. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:58-61 [Journal]
  54. Karl N. Levitt, William H. Kautz
    Cellular Arrays for the Solution of Graph Problems. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1972, v:15, n:9, pp:789-801 [Journal]
  55. Jay M. Spitzen, Karl N. Levitt, Lawrence Robinson
    An Example of Hierarchical Design and Proof. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1978, v:21, n:12, pp:1064-1075 [Journal]
  56. Richard J. Feiertag, Stuart Staniford-Chen, Karl N. Levitt, Mark Heckman, Dave Peticolas, Rick Crawford, Lee Benzinger, Sue Rho, Stephen Wu
    Intrusion detection inter-component adaptive negotiation. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:34, n:4, pp:605-621 [Journal]
  57. Raymond W. Lo, Karl N. Levitt, Ronald A. Olsson
    MCF: a malicious code filter. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:6, pp:541-566 [Journal]
  58. James A. Hoagland, Raju Pandey, Karl N. Levitt
    Security Policy Specification Using a Graphical Approach [Citation Graph (0, 0)][DBLP]
    CoRR, 1998, v:0, n:, pp:- [Journal]
  59. Bernard Elspas, Karl N. Levitt, Richard J. Waldinger, Abraham Waksman
    An Assessment of Techniques for Proving Program Correctness. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1972, v:4, n:2, pp:97-147 [Journal]
  60. Raymond W. Lo, Karl N. Levitt, Ronald A. Olsson
    Validation of Array Accesses: Integration of Flow Analysis and Program Verification Techniques. [Citation Graph (0, 0)][DBLP]
    Softw. Test., Verif. Reliab., 1997, v:7, n:4, pp:201-227 [Journal]
  61. Cui Zhang, Brian R. Becker, Dave Peticolas, Ronald A. Olsson, Karl N. Levitt
    LVT: A Layered Verification Technique for Distributed Computing Systems. [Citation Graph (0, 0)][DBLP]
    Softw. Test., Verif. Reliab., 1999, v:9, n:2, pp:107-133 [Journal]
  62. Cui Zhang, Ronald A. Olsson, Karl N. Levitt
    Formal Verification of a Programming Logic for a Distributed Programming Language. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1999, v:216, n:1-2, pp:213-235 [Journal]
  63. Cynthia E. Irvine, Karl N. Levitt
    Trusted Hardware: Can It Be Trustworthy? [Citation Graph (0, 0)][DBLP]
    DAC, 2007, pp:1-4 [Conf]
  64. Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lisa Clark, Karl N. Levitt
    Sanitization models and their limitations. [Citation Graph (0, 0)][DBLP]
    NSPW, 2006, pp:41-56 [Conf]
  65. Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matthew Bishop
    Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:127-145 [Conf]

  66. A study of the data commutation problems in a self-repairable multiprocessor. [Citation Graph (, )][DBLP]


  67. Using Soft-Line Recursive Response to Improve Query Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  68. iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  69. Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. [Citation Graph (, )][DBLP]


  70. Towards a framework for worm-defense evaluation. [Citation Graph (, )][DBLP]


  71. Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities. [Citation Graph (, )][DBLP]


  72. A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. [Citation Graph (, )][DBLP]


Search in 0.126secs, Finished in 0.131secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002