The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Phillip A. Porras: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras
    State Transition Analysis: A Rule-Based Intrusion Detection Approach. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Software Eng., 1995, v:21, n:3, pp:181-199 [Journal]
  2. Ulf Lindqvist, Phillip A. Porras
    eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:240-251 [Conf]
  3. Livio Ricciulli, Phillip A. Porras, Patrick Lincoln, Pankaj Kakkar, Steven Dawson
    An Adaptable Network COntrol and Reporting System (ANCORS). [Citation Graph (0, 0)][DBLP]
    DANCE, 2002, pp:466-483 [Conf]
  4. Peter G. Neumann, Phillip A. Porras
    Experience with EMERALD to Date. [Citation Graph (0, 0)][DBLP]
    Workshop on Intrusion Detection and Network Monitoring, 1999, pp:73-80 [Conf]
  5. Phillip A. Porras, Alfonso Valdes
    Live Traffic Analysis of TCP/IP Gateways. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  6. Linda Briesemeister, Phillip A. Porras
    Microscopic Simulation of a Group Defense Strategy. [Citation Graph (0, 0)][DBLP]
    PADS, 2005, pp:254-261 [Conf]
  7. Phillip A. Porras, Martin W. Fong, Alfonso Valdes
    A Mission-Impact-Based Approach to INFOSEC Alarm Correlation. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:95-114 [Conf]
  8. Ulf Lindqvist, Phillip A. Porras
    Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST). [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:146-161 [Conf]
  9. Phillip A. Porras, Richard A. Kemmerer
    Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:36-51 [Conf]
  10. Patrick Lincoln, Phillip A. Porras, Vitaly Shmatikov
    Privacy-Preserving Sharing and Correlation of Security Alerts. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:239-254 [Conf]
  11. Phillip A. Porras, Linda Briesemeister, Keith Skinner, Karl N. Levitt, Jeff Rowe, Yu-Cheng Allen Ting
    A hybrid quarantine defense. [Citation Graph (0, 0)][DBLP]
    WORM, 2004, pp:73-82 [Conf]
  12. Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu
    Cyber defense technology networking and evaluation. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:58-61 [Journal]
  13. Richard A. Kemmerer, Phillip A. Porras
    Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1991, v:17, n:11, pp:1166-1185 [Journal]
  14. Olin Sibert, Phillip A. Porras, Robert Lindell
    An Analysis of the Intel 80x86 Security Architecture and Implementations. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1996, v:22, n:5, pp:283-293 [Journal]
  15. Phillip A. Porras, Vitaly Shmatikov
    Large-scale collection and sanitization of network security data: risks and challenges. [Citation Graph (0, 0)][DBLP]
    NSPW, 2006, pp:57-64 [Conf]
  16. Dennis K. Nilsson, Phillip A. Porras, Erland Jonsson
    How to Secure Bluetooth-Based Pico Networks. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2007, pp:209-223 [Conf]

  17. Active Botnet Probing to Identify Obscure Command and Control Channels. [Citation Graph (, )][DBLP]


  18. Eureka: A Framework for Enabling Static Malware Analysis. [Citation Graph (, )][DBLP]


  19. ALICE@home: Distributed Framework for Detecting Malicious Sites. [Citation Graph (, )][DBLP]


  20. BLADE: Slashing the Invisible Channel of Drive-by Download Malware. [Citation Graph (, )][DBLP]


  21. Gaussian Process Learning for Cyber-Attack Early Warning. [Citation Graph (, )][DBLP]


  22. Highly Predictive Blacklisting. [Citation Graph (, )][DBLP]


  23. Epidemic profiles and defense of scale-free networks. [Citation Graph (, )][DBLP]


  24. Applying Formal Evaluation to Worm Defense Design. [Citation Graph (, )][DBLP]


  25. Automatically deducing propagation sequences that circumvent a collaborative worm defense. [Citation Graph (, )][DBLP]


  26. Inside risks - Reflections on Conficker. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002