| 2007 |
| 10 | EE | Duc T. Ha,
Shambhu J. Upadhyaya,
Hung Q. Ngo,
S. Pramanik,
Ramkumar Chinchani,
Sunu Mathew:
Insider Threat Analysis Using Information-Centric Modeling.
IFIP Int. Conf. Digital Forensics 2007: 55-73 |
| 2006 |
| 9 | EE | Madhusudhanan Chandrasekaran,
Ramkumar Chinchani,
Shambhu J. Upadhyaya:
PHONEY: Mimicking User Response to Detect Phishing Attacks.
WOWMOM 2006: 668-672 |
| 2005 |
| 8 | EE | Ramkumar Chinchani,
Anusha Iyer,
Hung Q. Ngo,
Shambhu J. Upadhyaya:
Towards a Theory of Insider Threat Assessment.
DSN 2005: 108-117 |
| 7 | EE | Ramkumar Chinchani,
Eric van den Berg:
A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows.
RAID 2005: 284-308 |
| 6 | EE | Ramkumar Chinchani,
Duc T. Ha,
Anusha Iyer,
Hung Q. Ngo,
Shambhu J. Upadhyaya:
On the Hardness of Approximating the Min-Hack Problem.
J. Comb. Optim. 9(3): 295-311 (2005) |
| 2004 |
| 5 | EE | Ramkumar Chinchani,
Aarthie Muthukrishnan,
Madhusudhanan Chandrasekaran,
Shambhu J. Upadhyaya:
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates.
ACSAC 2004: 189-204 |
| 4 | EE | Ramkumar Chinchani,
Anusha Iyer,
Bharat Jayaraman,
Shambhu J. Upadhyaya:
ARCHERR: Runtime Environment Driven Program Safety.
ESORICS 2004: 385-406 |
| 2003 |
| 3 | | Ramkumar Chinchani,
Anusha Iyer,
Bharat Jayaraman,
Shambhu J. Upadhyaya:
Insecure Programming: How Culpable is a Language's Syntax?
IAW 2003: 158-163 |
| 2 | EE | Ramkumar Chinchani,
Shambhu J. Upadhyaya,
Kevin A. Kwiat:
A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors.
IWIA 2003: 25-36 |
| 2001 |
| 1 | EE | Shambhu J. Upadhyaya,
Ramkumar Chinchani,
Kevin A. Kwiat:
An Analytical Framework for Reasoning about Intrusions.
SRDS 2001: 99- |