Search the dblp DataBase
Phillip A. Porras :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Koral Ilgun , Richard A. Kemmerer , Phillip A. Porras State Transition Analysis: A Rule-Based Intrusion Detection Approach. [Citation Graph (1, 0)][DBLP ] IEEE Trans. Software Eng., 1995, v:21, n:3, pp:181-199 [Journal ] Ulf Lindqvist , Phillip A. Porras eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:240-251 [Conf ] Livio Ricciulli , Phillip A. Porras , Patrick Lincoln , Pankaj Kakkar , Steven Dawson An Adaptable Network COntrol and Reporting System (ANCORS). [Citation Graph (0, 0)][DBLP ] DANCE, 2002, pp:466-483 [Conf ] Peter G. Neumann , Phillip A. Porras Experience with EMERALD to Date. [Citation Graph (0, 0)][DBLP ] Workshop on Intrusion Detection and Network Monitoring, 1999, pp:73-80 [Conf ] Phillip A. Porras , Alfonso Valdes Live Traffic Analysis of TCP/IP Gateways. [Citation Graph (0, 0)][DBLP ] NDSS, 1998, pp:- [Conf ] Linda Briesemeister , Phillip A. Porras Microscopic Simulation of a Group Defense Strategy. [Citation Graph (0, 0)][DBLP ] PADS, 2005, pp:254-261 [Conf ] Phillip A. Porras , Martin W. Fong , Alfonso Valdes A Mission-Impact-Based Approach to INFOSEC Alarm Correlation. [Citation Graph (0, 0)][DBLP ] RAID, 2002, pp:95-114 [Conf ] Ulf Lindqvist , Phillip A. Porras Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST). [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1999, pp:146-161 [Conf ] Phillip A. Porras , Richard A. Kemmerer Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1991, pp:36-51 [Conf ] Patrick Lincoln , Phillip A. Porras , Vitaly Shmatikov Privacy-Preserving Sharing and Correlation of Security Alerts. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:239-254 [Conf ] Phillip A. Porras , Linda Briesemeister , Keith Skinner , Karl N. Levitt , Jeff Rowe , Yu-Cheng Allen Ting A hybrid quarantine defense. [Citation Graph (0, 0)][DBLP ] WORM, 2004, pp:73-82 [Conf ] Ruzena Bajcsy , Terry Benzel , Matt Bishop , Robert Braden , Carla E. Brodley , Sonia Fahmy , Sally Floyd , W. Hardaker , Anthony D. Joseph , George Kesidis , Karl N. Levitt , Robert Lindell , Peng Liu , David Miller , Russ Mundy , Cliford Neuman , Ron Ostrenga , Vern Paxson , Phillip A. Porras , Catherine Rosenberg , J. Doug Tygar , Shankar Sastry , Daniel F. Sterne , Shyhtsun Felix Wu Cyber defense technology networking and evaluation. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:58-61 [Journal ] Richard A. Kemmerer , Phillip A. Porras Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1991, v:17, n:11, pp:1166-1185 [Journal ] Olin Sibert , Phillip A. Porras , Robert Lindell An Analysis of the Intel 80x86 Security Architecture and Implementations. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1996, v:22, n:5, pp:283-293 [Journal ] Phillip A. Porras , Vitaly Shmatikov Large-scale collection and sanitization of network security data: risks and challenges. [Citation Graph (0, 0)][DBLP ] NSPW, 2006, pp:57-64 [Conf ] Dennis K. Nilsson , Phillip A. Porras , Erland Jonsson How to Secure Bluetooth-Based Pico Networks. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2007, pp:209-223 [Conf ] Active Botnet Probing to Identify Obscure Command and Control Channels. [Citation Graph (, )][DBLP ] Eureka: A Framework for Enabling Static Malware Analysis. [Citation Graph (, )][DBLP ] ALICE@home: Distributed Framework for Detecting Malicious Sites. [Citation Graph (, )][DBLP ] BLADE: Slashing the Invisible Channel of Drive-by Download Malware. [Citation Graph (, )][DBLP ] Gaussian Process Learning for Cyber-Attack Early Warning. [Citation Graph (, )][DBLP ] Highly Predictive Blacklisting. [Citation Graph (, )][DBLP ] Epidemic profiles and defense of scale-free networks. [Citation Graph (, )][DBLP ] Applying Formal Evaluation to Worm Defense Design. [Citation Graph (, )][DBLP ] Automatically deducing propagation sequences that circumvent a collaborative worm defense. [Citation Graph (, )][DBLP ] Inside risks - Reflections on Conficker. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.006secs