Search the dblp DataBase
John McHugh :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
J. Thomas Haigh , Richard A. Kemmerer , John McHugh , William D. Young An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. [Citation Graph (1, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:157-168 [Journal ] A. H. Wadaa , Hussein M. Abdel-Wahab , John McHugh Heuristic authentication protocol for TCP/IP network applications under UNIX. [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference, 1992, pp:61-68 [Conf ] John McHugh An Information Flow Tool for Gypsy. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:191-204 [Conf ] John McHugh A Formal Definition for Information Flow in the Gypsy Expression Language. [Citation Graph (0, 0)][DBLP ] CSFW, 1988, pp:147-165 [Conf ] John McHugh Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:407-422 [Conf ] John McHugh Chaffing at the Bit: Thoughts on a Note by Ronald Rivest. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:395-404 [Conf ] Kymie M. C. Tan , John McHugh , Kevin S. Killourhy Hiding Intrusions: From the Abnormal to the Normal and Beyond. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:1-17 [Conf ] John McHugh , Carrie Gates Locality: a new paradigm for thinking about normal behavior and outsider threat. [Citation Graph (0, 0)][DBLP ] NSPW, 2003, pp:3-10 [Conf ] John McHugh The 1998 Lincoln Laboratory IDS Evaluation. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 2000, pp:145-161 [Conf ] John McHugh Ada 9X and Safety Critical/Secure Systems. [Citation Graph (0, 0)][DBLP ] TRI-Ada, 1992, pp:55-59 [Conf ] Hilary K. Browne , William A. Arbaugh , John McHugh , William L. Fithen A Trend Analysis of Exploitations. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2001, pp:214-0 [Conf ] J. Thomas Haigh , Richard A. Kemmerer , John McHugh , William D. Young An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1986, pp:14-24 [Conf ] John McHugh , Andrew P. Moore A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area Network. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1986, pp:34-39 [Conf ] William D. Young , John McHugh Coding for a Believable Specification to Implementation Mapping. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1987, pp:140-149 [Conf ] Nancy R. Mead , Richard C. Linger , John McHugh , Howard F. Lipson Managing Software Development for Survivable Systems. [Citation Graph (0, 0)][DBLP ] Ann. Software Eng., 2001, v:11, n:1, pp:45-78 [Journal ] William A. Arbaugh , William L. Fithen , John McHugh Windows of Vulnerability: A Case Study Analysis. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2000, v:33, n:12, pp:52-59 [Journal ] John McHugh Intrusion and intrusion detection. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2001, v:1, n:1, pp:14-35 [Journal ] Jeremy Epstein , John McHugh , Hilarie K. Orman , R. Pascale , Ann B. Marmor-Squires , B. Danner , C. Martin , M. Branstad , J. Benson , D. Rothnie A High Assurance Window System Prototype. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1993, v:2, n:2-3, pp:159-190 [Journal ] John McHugh , Alan M. Christie , Julia Allen Defending Yourself: The Role of Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] IEEE Software, 2000, v:17, n:5, pp:- [Journal ] John McHugh Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2000, v:3, n:4, pp:262-294 [Journal ] John McHugh Guest Editorial: Introduction to the Special Section. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1996, v:22, n:1, pp:3-5 [Journal ] Daniel Boteanu , José M. Fernandez , John McHugh , John Mullins Queue Management as a DoS Counter-Measure? [Citation Graph (0, 0)][DBLP ] ISC, 2007, pp:263-280 [Conf ] Quality of protection: measuring the unmeasurable? [Citation Graph (, )][DBLP ] Implementing and testing dynamic timeout adjustment as a dos counter-measure. [Citation Graph (, )][DBLP ] The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors. [Citation Graph (, )][DBLP ] Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?. [Citation Graph (, )][DBLP ] Search in 0.016secs, Finished in 0.017secs