Search the dblp DataBase
Richard Lippmann :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Eric I. Chang , Richard Lippmann Using Genetic Algorithms to Improve Pattern Classification Performance. [Citation Graph (0, 0)][DBLP ] NIPS, 1990, pp:797-803 [Conf ] Eric I. Chang , Richard Lippmann A Boundary Hunting Radial Basis Function Classifier which Allocates Centers Constructively. [Citation Graph (0, 0)][DBLP ] NIPS, 1992, pp:139-146 [Conf ] Eric I. Chang , Richard Lippmann Figure of Merit Training for Detection and Spotting. [Citation Graph (0, 0)][DBLP ] NIPS, 1993, pp:1019-1026 [Conf ] Eric I. Chang , Richard Lippmann Using Voice Transformations to Create Additional Training Talkers for Word Spotting. [Citation Graph (0, 0)][DBLP ] NIPS, 1994, pp:875-882 [Conf ] William Y. Huang , Richard Lippmann Neural Net and Traditional Classifiers. [Citation Graph (0, 0)][DBLP ] NIPS, 1987, pp:387-396 [Conf ] William Y. Huang , Richard Lippmann HMM Speech Recognition with Neural Net Discrimination. [Citation Graph (0, 0)][DBLP ] NIPS, 1989, pp:194-202 [Conf ] John Lazzaro , John Wawrzynek , Richard Lippmann A Micropower Analog VLSI HMM State Decoder for Wordspotting. [Citation Graph (0, 0)][DBLP ] NIPS, 1996, pp:727-733 [Conf ] Yuchun Lee , Richard Lippmann Practical Characteristics of Neural Network and Conventional Pattern Classifiers on Artificial and Speech Problems. [Citation Graph (0, 0)][DBLP ] NIPS, 1989, pp:168-177 [Conf ] Richard Lippmann , Paul Beckman Adaptive Neural Net Preprocessing for Signal Detection in Non-Gaussian Noise. [Citation Graph (0, 0)][DBLP ] NIPS, 1988, pp:124-132 [Conf ] Richard Lippmann , Linda Kukolich , David Shahian Predicting the Risk of Complications in Coronary Artery Bypass Operations using Neural Networks. [Citation Graph (0, 0)][DBLP ] NIPS, 1994, pp:1055-1062 [Conf ] Kenney Ng , Richard Lippmann Practical Characteristics of Neural Network and Conventional Patterns Classifiers. [Citation Graph (0, 0)][DBLP ] NIPS, 1990, pp:970-976 [Conf ] Elliot Singer , Richard Lippmann Improved Hidden Markov Models Speech Recognition Using Radial Basis Function Networks. [Citation Graph (0, 0)][DBLP ] NIPS, 1991, pp:159-166 [Conf ] Richard Lippmann , Robert K. Cunningham Improving Intrusion Detection Performance using Keyword Selection and Neural Networks. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Richard Lippmann , Robert K. Cunningham , David J. Fried , Isaac Graf , Kris R. Kendall , Seth E. Webster , Marc A. Zissman Results of the DARPA 1998 Offline Intrusion Detection Evaluation. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Richard Lippmann , Joshua W. Haines , David J. Fried , Jonathan Korba , Kumar Das Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2000, pp:162-182 [Conf ] Richard Lippmann , Seth E. Webster , Douglas Stetson The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. [Citation Graph (0, 0)][DBLP ] RAID, 2002, pp:307-326 [Conf ] Misha Zitser , Richard Lippmann , Tim Leek Testing static analysis tools using exploitable buffer overflows from open source code. [Citation Graph (0, 0)][DBLP ] SIGSOFT FSE, 2004, pp:97-106 [Conf ] Oleg Sheyner , Joshua W. Haines , Somesh Jha , Richard Lippmann , Jeannette M. Wing Automated Generation and Analysis of Attack Graphs. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2002, pp:273-284 [Conf ] Richard Lippmann , Robert K. Cunningham Improving intrusion detection performance using keyword selection and neural networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2000, v:34, n:4, pp:597-603 [Journal ] Richard Lippmann , Joshua W. Haines , David J. Fried , Jonathan Korba , Kumar Das The 1999 DARPA off-line intrusion detection evaluation. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2000, v:34, n:4, pp:579-595 [Journal ] Richard Lippmann Book Review: Neural Networks, a Comprehensive Foundation, by Simon Haykin. [Citation Graph (0, 0)][DBLP ] Int. J. Neural Syst., 1994, v:5, n:4, pp:363-364 [Journal ] Philip K. Chan , Richard Lippmann Machine Learning for Computer Security. [Citation Graph (0, 0)][DBLP ] Journal of Machine Learning Research, 2006, v:6, n:, pp:2669-2672 [Journal ] Robert K. Cunningham , Richard Lippmann , Seth E. Webster Detecting and displaying novel computer attacks with Macroscope. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:275-281 [Journal ] Kyle Ingols , Richard Lippmann , Keith Piwowarski Practical Attack Graph Generation for Network Defense. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:121-130 [Conf ] Seth E. Webster , Richard Lippmann , Marc A. Zissman Experience Using Active and Passive Mapping for Network Situational Awareness. [Citation Graph (0, 0)][DBLP ] NCA, 2006, pp:19-26 [Conf ] Modeling Modern Network Attacks and Countermeasures Using Attack Graphs. [Citation Graph (, )][DBLP ] GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. [Citation Graph (, )][DBLP ] An Interactive Attack Graph Cascade and Reachability Display. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs