The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

John McHugh: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young
    An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:157-168 [Journal]
  2. A. H. Wadaa, Hussein M. Abdel-Wahab, John McHugh
    Heuristic authentication protocol for TCP/IP network applications under UNIX. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 1992, pp:61-68 [Conf]
  3. John McHugh
    An Information Flow Tool for Gypsy. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:191-204 [Conf]
  4. John McHugh
    A Formal Definition for Information Flow in the Gypsy Expression Language. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:147-165 [Conf]
  5. John McHugh
    Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:407-422 [Conf]
  6. John McHugh
    Chaffing at the Bit: Thoughts on a Note by Ronald Rivest. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:395-404 [Conf]
  7. Kymie M. C. Tan, John McHugh, Kevin S. Killourhy
    Hiding Intrusions: From the Abnormal to the Normal and Beyond. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:1-17 [Conf]
  8. John McHugh, Carrie Gates
    Locality: a new paradigm for thinking about normal behavior and outsider threat. [Citation Graph (0, 0)][DBLP]
    NSPW, 2003, pp:3-10 [Conf]
  9. John McHugh
    The 1998 Lincoln Laboratory IDS Evaluation. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:145-161 [Conf]
  10. John McHugh
    Ada 9X and Safety Critical/Secure Systems. [Citation Graph (0, 0)][DBLP]
    TRI-Ada, 1992, pp:55-59 [Conf]
  11. Hilary K. Browne, William A. Arbaugh, John McHugh, William L. Fithen
    A Trend Analysis of Exploitations. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2001, pp:214-0 [Conf]
  12. J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young
    An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:14-24 [Conf]
  13. John McHugh, Andrew P. Moore
    A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area Network. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:34-39 [Conf]
  14. William D. Young, John McHugh
    Coding for a Believable Specification to Implementation Mapping. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:140-149 [Conf]
  15. Nancy R. Mead, Richard C. Linger, John McHugh, Howard F. Lipson
    Managing Software Development for Survivable Systems. [Citation Graph (0, 0)][DBLP]
    Ann. Software Eng., 2001, v:11, n:1, pp:45-78 [Journal]
  16. William A. Arbaugh, William L. Fithen, John McHugh
    Windows of Vulnerability: A Case Study Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2000, v:33, n:12, pp:52-59 [Journal]
  17. John McHugh
    Intrusion and intrusion detection. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2001, v:1, n:1, pp:14-35 [Journal]
  18. Jeremy Epstein, John McHugh, Hilarie K. Orman, R. Pascale, Ann B. Marmor-Squires, B. Danner, C. Martin, M. Branstad, J. Benson, D. Rothnie
    A High Assurance Window System Prototype. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1993, v:2, n:2-3, pp:159-190 [Journal]
  19. John McHugh, Alan M. Christie, Julia Allen
    Defending Yourself: The Role of Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  20. John McHugh
    Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2000, v:3, n:4, pp:262-294 [Journal]
  21. John McHugh
    Guest Editorial: Introduction to the Special Section. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1996, v:22, n:1, pp:3-5 [Journal]
  22. Daniel Boteanu, José M. Fernandez, John McHugh, John Mullins
    Queue Management as a DoS Counter-Measure? [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:263-280 [Conf]

  23. Quality of protection: measuring the unmeasurable? [Citation Graph (, )][DBLP]


  24. Implementing and testing dynamic timeout adjustment as a dos counter-measure. [Citation Graph (, )][DBLP]


  25. The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors. [Citation Graph (, )][DBLP]


  26. Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002