The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Richard Lippmann: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Eric I. Chang, Richard Lippmann
    Using Genetic Algorithms to Improve Pattern Classification Performance. [Citation Graph (0, 0)][DBLP]
    NIPS, 1990, pp:797-803 [Conf]
  2. Eric I. Chang, Richard Lippmann
    A Boundary Hunting Radial Basis Function Classifier which Allocates Centers Constructively. [Citation Graph (0, 0)][DBLP]
    NIPS, 1992, pp:139-146 [Conf]
  3. Eric I. Chang, Richard Lippmann
    Figure of Merit Training for Detection and Spotting. [Citation Graph (0, 0)][DBLP]
    NIPS, 1993, pp:1019-1026 [Conf]
  4. Eric I. Chang, Richard Lippmann
    Using Voice Transformations to Create Additional Training Talkers for Word Spotting. [Citation Graph (0, 0)][DBLP]
    NIPS, 1994, pp:875-882 [Conf]
  5. William Y. Huang, Richard Lippmann
    Neural Net and Traditional Classifiers. [Citation Graph (0, 0)][DBLP]
    NIPS, 1987, pp:387-396 [Conf]
  6. William Y. Huang, Richard Lippmann
    HMM Speech Recognition with Neural Net Discrimination. [Citation Graph (0, 0)][DBLP]
    NIPS, 1989, pp:194-202 [Conf]
  7. John Lazzaro, John Wawrzynek, Richard Lippmann
    A Micropower Analog VLSI HMM State Decoder for Wordspotting. [Citation Graph (0, 0)][DBLP]
    NIPS, 1996, pp:727-733 [Conf]
  8. Yuchun Lee, Richard Lippmann
    Practical Characteristics of Neural Network and Conventional Pattern Classifiers on Artificial and Speech Problems. [Citation Graph (0, 0)][DBLP]
    NIPS, 1989, pp:168-177 [Conf]
  9. Richard Lippmann, Paul Beckman
    Adaptive Neural Net Preprocessing for Signal Detection in Non-Gaussian Noise. [Citation Graph (0, 0)][DBLP]
    NIPS, 1988, pp:124-132 [Conf]
  10. Richard Lippmann, Linda Kukolich, David Shahian
    Predicting the Risk of Complications in Coronary Artery Bypass Operations using Neural Networks. [Citation Graph (0, 0)][DBLP]
    NIPS, 1994, pp:1055-1062 [Conf]
  11. Kenney Ng, Richard Lippmann
    Practical Characteristics of Neural Network and Conventional Patterns Classifiers. [Citation Graph (0, 0)][DBLP]
    NIPS, 1990, pp:970-976 [Conf]
  12. Elliot Singer, Richard Lippmann
    Improved Hidden Markov Models Speech Recognition Using Radial Basis Function Networks. [Citation Graph (0, 0)][DBLP]
    NIPS, 1991, pp:159-166 [Conf]
  13. Richard Lippmann, Robert K. Cunningham
    Improving Intrusion Detection Performance using Keyword Selection and Neural Networks. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  14. Richard Lippmann, Robert K. Cunningham, David J. Fried, Isaac Graf, Kris R. Kendall, Seth E. Webster, Marc A. Zissman
    Results of the DARPA 1998 Offline Intrusion Detection Evaluation. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  15. Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das
    Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:162-182 [Conf]
  16. Richard Lippmann, Seth E. Webster, Douglas Stetson
    The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    RAID, 2002, pp:307-326 [Conf]
  17. Misha Zitser, Richard Lippmann, Tim Leek
    Testing static analysis tools using exploitable buffer overflows from open source code. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 2004, pp:97-106 [Conf]
  18. Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing
    Automated Generation and Analysis of Attack Graphs. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:273-284 [Conf]
  19. Richard Lippmann, Robert K. Cunningham
    Improving intrusion detection performance using keyword selection and neural networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:34, n:4, pp:597-603 [Journal]
  20. Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das
    The 1999 DARPA off-line intrusion detection evaluation. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:34, n:4, pp:579-595 [Journal]
  21. Richard Lippmann
    Book Review: Neural Networks, a Comprehensive Foundation, by Simon Haykin. [Citation Graph (0, 0)][DBLP]
    Int. J. Neural Syst., 1994, v:5, n:4, pp:363-364 [Journal]
  22. Philip K. Chan, Richard Lippmann
    Machine Learning for Computer Security. [Citation Graph (0, 0)][DBLP]
    Journal of Machine Learning Research, 2006, v:6, n:, pp:2669-2672 [Journal]
  23. Robert K. Cunningham, Richard Lippmann, Seth E. Webster
    Detecting and displaying novel computer attacks with Macroscope. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:275-281 [Journal]
  24. Kyle Ingols, Richard Lippmann, Keith Piwowarski
    Practical Attack Graph Generation for Network Defense. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:121-130 [Conf]
  25. Seth E. Webster, Richard Lippmann, Marc A. Zissman
    Experience Using Active and Passive Mapping for Network Situational Awareness. [Citation Graph (0, 0)][DBLP]
    NCA, 2006, pp:19-26 [Conf]

  26. Modeling Modern Network Attacks and Countermeasures Using Attack Graphs. [Citation Graph (, )][DBLP]


  27. GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. [Citation Graph (, )][DBLP]


  28. An Interactive Attack Graph Cascade and Reachability Display. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002