2007 |
10 | EE | Duc T. Ha,
Shambhu J. Upadhyaya,
Hung Q. Ngo,
S. Pramanik,
Ramkumar Chinchani,
Sunu Mathew:
Insider Threat Analysis Using Information-Centric Modeling.
IFIP Int. Conf. Digital Forensics 2007: 55-73 |
2006 |
9 | EE | Madhusudhanan Chandrasekaran,
Ramkumar Chinchani,
Shambhu J. Upadhyaya:
PHONEY: Mimicking User Response to Detect Phishing Attacks.
WOWMOM 2006: 668-672 |
2005 |
8 | EE | Ramkumar Chinchani,
Anusha Iyer,
Hung Q. Ngo,
Shambhu J. Upadhyaya:
Towards a Theory of Insider Threat Assessment.
DSN 2005: 108-117 |
7 | EE | Ramkumar Chinchani,
Eric van den Berg:
A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows.
RAID 2005: 284-308 |
6 | EE | Ramkumar Chinchani,
Duc T. Ha,
Anusha Iyer,
Hung Q. Ngo,
Shambhu J. Upadhyaya:
On the Hardness of Approximating the Min-Hack Problem.
J. Comb. Optim. 9(3): 295-311 (2005) |
2004 |
5 | EE | Ramkumar Chinchani,
Aarthie Muthukrishnan,
Madhusudhanan Chandrasekaran,
Shambhu J. Upadhyaya:
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates.
ACSAC 2004: 189-204 |
4 | EE | Ramkumar Chinchani,
Anusha Iyer,
Bharat Jayaraman,
Shambhu J. Upadhyaya:
ARCHERR: Runtime Environment Driven Program Safety.
ESORICS 2004: 385-406 |
2003 |
3 | | Ramkumar Chinchani,
Anusha Iyer,
Bharat Jayaraman,
Shambhu J. Upadhyaya:
Insecure Programming: How Culpable is a Language's Syntax?
IAW 2003: 158-163 |
2 | EE | Ramkumar Chinchani,
Shambhu J. Upadhyaya,
Kevin A. Kwiat:
A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors.
IWIA 2003: 25-36 |
2001 |
1 | EE | Shambhu J. Upadhyaya,
Ramkumar Chinchani,
Kevin A. Kwiat:
An Analytical Framework for Reasoning about Intrusions.
SRDS 2001: 99- |