Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Anup K. Ghosh
@book{DBLP:series/ais/100, editor = {Sushil Jajodia and Anup K. Ghosh and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Moving Target Defense {II} - Application of Game Theory and Adversarial Modeling}, series = {Advances in Information Security}, volume = {100}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-5416-8}, doi = {10.1007/978-1-4614-5416-8}, isbn = {978-1-4614-5415-1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/100.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GhoshM12, author = {Anup K. Ghosh and Gary McGraw}, title = {Lost Decade or Golden Era: Computer Security since 9/11}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {1}, pages = {6--10}, year = {2012}, url = {https://doi.org/10.1109/MSP.2012.12}, doi = {10.1109/MSP.2012.12}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GhoshM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/LocastoGJS11, author = {Michael E. Locasto and Anup K. Ghosh and Sushil Jajodia and Angelos Stavrou}, title = {The ephemeral legion: producing an expert cyber-security work force from thin air}, journal = {Commun. {ACM}}, volume = {54}, number = {1}, pages = {129--131}, year = {2011}, url = {https://doi.org/10.1145/1866739.1866764}, doi = {10.1145/1866739.1866764}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/LocastoGJS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/KeromytisSYSGED11, author = {Angelos D. Keromytis and Salvatore J. Stolfo and Junfeng Yang and Angelos Stavrou and Anup K. Ghosh and Dawson R. Engler and Marc Dacier and Matthew C. Elder and Darrell M. Kienzle}, title = {The {MINESTRONE} Architecture Combining Static and Dynamic Analysis Techniques for Software Security}, booktitle = {First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands, July 6, 2011}, pages = {53--56}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.ieeecomputersociety.org/10.1109/SysSec.2011.33}, doi = {10.1109/SYSSEC.2011.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/KeromytisSYSGED11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LeWJSGJ11, author = {Meixing Le and Zhaohui Wang and Quan Jia and Angelos Stavrou and Anup K. Ghosh and Sushil Jajodia}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Trading Elephants for Ants: Efficient Post-attack Reconstitution}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {460--469}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_27}, doi = {10.1007/978-3-642-31909-9\_27}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/LeWJSGJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/HuangG11, author = {Yih Huang and Anup K. Ghosh}, editor = {Sushil Jajodia and Anup K. Ghosh and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Introducing Diversity and Uncertainty to Create Moving Attack Surfaces for Web Services}, booktitle = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats}, series = {Advances in Information Security}, volume = {54}, pages = {131--151}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-0977-9\_8}, doi = {10.1007/978-1-4614-0977-9\_8}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/HuangG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/54, editor = {Sushil Jajodia and Anup K. Ghosh and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats}, series = {Advances in Information Security}, volume = {54}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-0977-9}, doi = {10.1007/978-1-4614-0977-9}, isbn = {978-1-4614-0976-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/54.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/HuangGBM10, author = {Yih Huang and Anup K. Ghosh and Tom Bracewell and Brian Mastropietro}, title = {A security evaluation of a novel resilient web serving architecture: Lessons learned through industry/academia collaboration}, booktitle = {{IEEE/IFIP} International Conference on Dependable Systems and Networks Workshops {(DSN-W} 2010), Chicago, Illinois, USA, June 28 - July 1, 2010}, pages = {188--193}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DSNW.2010.5542597}, doi = {10.1109/DSNW.2010.5542597}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/HuangGBM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/WangHG10, author = {Jiang Wang and Yih Huang and Anup K. Ghosh}, title = {SafeFox: {A} Safe Lightweight Virtual Browsing Environment}, booktitle = {43rd Hawaii International International Conference on Systems Science {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HICSS.2010.324}, doi = {10.1109/HICSS.2010.324}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/WangHG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/WangNSG10, author = {Jiang Wang and Sameer Niphadkar and Angelos Stavrou and Anup K. Ghosh}, title = {A Virtualization Architecture for In-Depth Kernel Isolation}, booktitle = {43rd Hawaii International International Conference on Systems Science {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HICSS.2010.41}, doi = {10.1109/HICSS.2010.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/WangNSG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangSG10, author = {Jiang Wang and Angelos Stavrou and Anup K. Ghosh}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {HyperCheck: {A} Hardware-Assisted Integrity Monitor}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {158--177}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_9}, doi = {10.1007/978-3-642-15512-3\_9}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/WangSG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/HuangG09, author = {Yih Huang and Anup K. Ghosh}, title = {Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services}, booktitle = {Proceedings of The Eighth {IEEE} International Symposium on Networking Computing and Applications, {NCA} 2009, July 9-11, 2009, Cambridge, Massachusetts, {USA}}, pages = {114--117}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NCA.2009.37}, doi = {10.1109/NCA.2009.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/HuangG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/GhoshMS08, author = {Anup K. Ghosh and Amitava Mukherjee and Debashis Saha}, title = {{TCP} throughput enhancement in wired-cum-wireless network}, journal = {Comput. Commun.}, volume = {31}, number = {17}, pages = {4162--4166}, year = {2008}, url = {https://doi.org/10.1016/j.comcom.2008.09.017}, doi = {10.1016/J.COMCOM.2008.09.017}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/GhoshMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuangSGJ08, author = {Yih Huang and Angelos Stavrou and Anup K. Ghosh and Sushil Jajodia}, editor = {Jason Nieh and Angelos Stavrou}, title = {Efficiently tracking application interactions using lightweight virtualization}, booktitle = {Proceedings of the 1st {ACM} Workshop on Virtual Machine Security, VMSec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {19--28}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456482.1456486}, doi = {10.1145/1456482.1456486}, timestamp = {Wed, 04 May 2022 13:02:17 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HuangSGJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/WangGH08, author = {Jiang Wang and Anup K. Ghosh and Yih Huang}, editor = {Elisa Bertino and James B. D. Joshi}, title = {Web Canary: {A} Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {10}, pages = {24--33}, publisher = {Springer / {ICST}}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03354-4\_3}, doi = {10.1007/978-3-642-03354-4\_3}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colcom/WangGH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GagnonTG07, author = {Michael N. Gagnon and Stephen Taylor and Anup K. Ghosh}, title = {Software Protection through Anti-Debugging}, journal = {{IEEE} Secur. Priv.}, volume = {5}, number = {3}, pages = {82--84}, year = {2007}, url = {https://doi.org/10.1109/MSP.2007.71}, doi = {10.1109/MSP.2007.71}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/GagnonTG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/GhoshDRM07, author = {Anup K. Ghosh and Sudipto Das and Rajesh Roy and Amitava Mukherjee}, title = {Sender Side Intelligence for {TCP} Throughput Enhancement in Wired-Cum-Wireless Network}, booktitle = {Proceedings of the {IEEE} 18th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2007, 3-7 September 2007, Athens, Greece}, pages = {1--5}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/PIMRC.2007.4394381}, doi = {10.1109/PIMRC.2007.4394381}, timestamp = {Fri, 11 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/GhoshDRM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/software/GhoshHW02, author = {Anup K. Ghosh and Chuck Howell and James A. Whittaker}, title = {Building Software Securely from the Ground Up}, journal = {{IEEE} Softw.}, volume = {19}, number = {1}, pages = {14--16}, year = {2002}, url = {https://doi.org/10.1109/MS.2002.976936}, doi = {10.1109/MS.2002.976936}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/software/GhoshHW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MichaelG02, author = {Christoph C. Michael and Anup K. Ghosh}, title = {Simple, state-based approaches to program-based anomaly detection}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {3}, pages = {203--237}, year = {2002}, url = {https://doi.org/10.1145/545186.545187}, doi = {10.1145/545186.545187}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MichaelG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchmidHG02, author = {Matthew Schmid and Frank Hill and Anup K. Ghosh}, title = {Protecting Data from Malicious Software}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {199--208}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176291}, doi = {10.1109/CSAC.2002.1176291}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SchmidHG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/GhoshS01, author = {Anup K. Ghosh and Tara M. Swaminatha}, title = {Software security and privacy risks in mobile e-commerce}, journal = {Commun. {ACM}}, volume = {44}, number = {2}, pages = {51--57}, year = {2001}, url = {https://doi.org/10.1145/359205.359227}, doi = {10.1145/359205.359227}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/GhoshS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BishopGW01, author = {Matt Bishop and Anup K. Ghosh and James A. Whittaker}, title = {How Useful is Software Fault Injection for Evaluating the Security of {COTS} Products?}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {339--340}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.ieeecomputersociety.org/10.1109/ACSAC.2001.10009}, doi = {10.1109/ACSAC.2001.10009}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BishopGW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Ghosh01, author = {Anup K. Ghosh}, editor = {Anup K. Ghosh}, title = {New Security Issues in Mobile E-Commerce}, booktitle = {E-Commerce Security and Privacy}, series = {Advances in Information Security}, volume = {2}, pages = {29--46}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-1-4615-1467-1\_3}, doi = {10.1007/978-1-4615-1467-1\_3}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/Ghosh01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/2, editor = {Anup K. Ghosh}, title = {E-Commerce Security and Privacy}, series = {Advances in Information Security}, volume = {2}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-1-4615-1467-1}, doi = {10.1007/978-1-4615-1467-1}, isbn = {0-7923-7399-5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MichaelG00, author = {Christoph C. Michael and Anup K. Ghosh}, title = {Two State-based Approaches to Program-based Anomaly Detection}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {21}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898854}, doi = {10.1109/ACSAC.2000.898854}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MichaelG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MichaelG00, author = {Christoph C. Michael and Anup K. Ghosh}, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {Using Finite Automata to Mine Execution Data for Intrusion Detection: {A} Preliminary Report}, booktitle = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, pages = {66--79}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3\_5}, doi = {10.1007/3-540-39945-3\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/MichaelG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GhoshMS00, author = {Anup K. Ghosh and Christoph C. Michael and Michael Schatz}, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {A Real-Time Intrusion Detection System Based on Learning Program Behavior}, booktitle = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, pages = {93--109}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3\_7}, doi = {10.1007/3-540-39945-3\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GhoshMS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/GhoshV99, author = {Anup K. Ghosh and Jeffrey M. Voas}, title = {Inoculating Software for Survivability}, journal = {Commun. {ACM}}, volume = {42}, number = {7}, pages = {38--44}, year = {1999}, url = {https://doi.org/10.1145/306549.306563}, doi = {10.1145/306549.306563}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/GhoshV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/GhoshS99, author = {Anup K. Ghosh and Aaron Schwartzbard}, editor = {Vijayalakshmi Atluri and John Hale}, title = {Analyzing the Performance of Program Behavior Profiling for Intrusion Detection}, booktitle = {Research Advances in Database and Information Systems Security, {IFIP} {WG} 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {171}, pages = {19--32}, publisher = {Kluwer}, year = {1999}, timestamp = {Thu, 03 Jan 2002 11:56:17 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/GhoshS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ftcs/GhoshSH99, author = {Anup K. Ghosh and Matthew Schmid and Frank Hill}, title = {Wrapping Windows {NT} Software for Robustness}, booktitle = {Digest of Papers: FTCS-29, The Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing, Madison, Wisconsin, USA, June 15-18, 1999}, pages = {344--347}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/FTCS.1999.781070}, doi = {10.1109/FTCS.1999.781070}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ftcs/GhoshSH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/id/GhoshSS99, author = {Anup K. Ghosh and Aaron Schwartzbard and Michael Schatz}, title = {Learning Program Behavior Profiles for Intrusion Detection}, booktitle = {Proceedings of the Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, USA, April 9-12, 1999}, pages = {51--62}, publisher = {{USENIX}}, year = {1999}, url = {http://www.usenix.org/publications/library/proceedings/detection99/ghosh.html}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/id/GhoshSS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/GhoshS99, author = {Anup K. Ghosh and Matthew Schmid}, title = {An approach to testing {COTS} software for robustness to operating system exceptions and errors}, booktitle = {10th International Symposium on Software Reliability Engineering, ISSRE, 1999, Boca Raton, FL, USA, November 1-4, 1999}, pages = {166--174}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/ISSRE.1999.809321}, doi = {10.1109/ISSRE.1999.809321}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/GhoshS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SchwartzbardG99, author = {Aaron Schwartzbard and Anup K. Ghosh}, title = {A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows {NT}}, booktitle = {Recent Advances in Intrusion Detection, Second International Workshop, {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999}, year = {1999}, timestamp = {Thu, 08 Aug 2019 09:26:07 +0200}, biburl = {https://dblp.org/rec/conf/raid/SchwartzbardG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GhoshS99, author = {Anup K. Ghosh and Aaron Schwartzbard}, editor = {G. Winfield Treese}, title = {A Study in Using Neural Networks for Anomaly and Misuse Detection}, booktitle = {Proceedings of the 8th {USENIX} Security Symposium, Washington, DC, USA, August 23-26, 1999}, publisher = {{USENIX} Association}, year = {1999}, url = {https://www.usenix.org/conference/8th-usenix-security-symposium/study-using-neural-networks-anomaly-and-misuse-detection}, timestamp = {Mon, 01 Feb 2021 08:43:06 +0100}, biburl = {https://dblp.org/rec/conf/uss/GhoshS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/Ghosh99, author = {Anup K. Ghosh}, title = {Certifying E-Commerce Software for Security}, booktitle = {Proceedings of the First International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems, Santa Clara, California, USA, April 8-9, 1999}, pages = {64--67}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/WECWIS.1999.788187}, doi = {10.1109/WECWIS.1999.788187}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wecwis/Ghosh99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GoshWC98, author = {Anup K. Ghosh and James Wanken and Frank Charron}, title = {Detecting Anomalous and Unknown Intrusions Against Programs}, booktitle = {14th Annual Computer Security Applications Conference {(ACSAC} 1998), 7-11 December 1998, Scottsdale, AZ, {USA}}, pages = {259--267}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/CSAC.1998.738646}, doi = {10.1109/CSAC.1998.738646}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GoshWC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Ghosh98, author = {Anup K. Ghosh}, editor = {Sushil Jajodia}, title = {E-Commerce Security: No Silver Bullet}, booktitle = {Database Security {XII:} Status and Prospects, {IFIP} {TC11} {WG} 11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece}, series = {{IFIP} Conference Proceedings}, volume = {142}, pages = {3--16}, publisher = {Kluwer}, year = {1998}, timestamp = {Mon, 21 Oct 2002 13:30:47 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/Ghosh98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/GhoshSS98, author = {Anup K. Ghosh and Matthew Schmid and V. Shah}, title = {Testing the robustness of Windows {NT} software}, booktitle = {Ninth International Symposium on Software Reliability Engineering, {ISSRE} 1998, Paderborn, Germany, November 4-7, 1998}, pages = {231--235}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ISSRE.1998.730886}, doi = {10.1109/ISSRE.1998.730886}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/GhoshSS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/Ghosh98, author = {Anup K. Ghosh}, title = {On certifying mobile code for secure applications}, booktitle = {Ninth International Symposium on Software Reliability Engineering, {ISSRE} 1998, Paderborn, Germany, November 4-7, 1998}, pages = {381}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ISSRE.1998.730905}, doi = {10.1109/ISSRE.1998.730905}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/Ghosh98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GhoshOM98, author = {Anup K. Ghosh and Tom O'Connor and Gary McGraw}, title = {An Automated Approach for Identifying Potential Vulnerabilities in Software}, booktitle = {Security and Privacy - 1998 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, May 3-6, 1998, Proceedings}, pages = {104--114}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/SECPRI.1998.674827}, doi = {10.1109/SECPRI.1998.674827}, timestamp = {Thu, 21 Sep 2023 15:57:37 +0200}, biburl = {https://dblp.org/rec/conf/sp/GhoshOM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/VoasGCK97, author = {Jeffrey M. Voas and Anup K. Ghosh and Frank Charron and Lora Kassab}, title = {Reducing uncertainty about common-mode failures}, booktitle = {Eighth International Symposium on Software Reliability Engineering, {ISSRE} 1997, Albuquerque, NM, USA, November 2-5, 1997}, pages = {308--319}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/ISSRE.1997.630879}, doi = {10.1109/ISSRE.1997.630879}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/VoasGCK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.