dblp.uni-trier.dewww.uni-trier.de

Anup K. Ghosh

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
18EEYih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia: Efficiently tracking application interactions using lightweight virtualization. VMSec 2008: 19-28
17EEAnup K. Ghosh, Amitava Mukherjee, Debashis Saha: TCP throughput enhancement in wired-cum-wireless network. Computer Communications 31(17): 4162-4166 (2008)
2002
16EEMatthew Schmid, Frank Hill, Anup K. Ghosh: Protecting Data from Malicious Software. ACSAC 2002: 199-208
15EEChristoph C. Michael, Anup K. Ghosh: Simple, state-based approaches to program-based anomaly detection. ACM Trans. Inf. Syst. Secur. 5(3): 203-237 (2002)
14EEAnup K. Ghosh, Chuck Howell, James A. Whittaker: Building Software Securely from the Ground Up. IEEE Software 19(1): 14-16 (2002)
2001
13EEMatt Bishop, Anup K. Ghosh, James A. Whittaker: How Useful is Software Fault Injection for Evaluating the Security of COTS Products? ACSAC 2001: 339-342
12EEAnup K. Ghosh, Tara M. Swaminatha: Software security and privacy risks in mobile e-commerce. Commun. ACM 44(2): 51-57 (2001)
2000
11EEChristoph C. Michael, Anup K. Ghosh: Two State-based Approaches to Program-based Anomaly Detection. ACSAC 2000: 21-
10EEChristoph C. Michael, Anup K. Ghosh: Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report. Recent Advances in Intrusion Detection 2000: 66-79
9EEAnup K. Ghosh, Christoph C. Michael, Michael Schatz: A Real-Time Intrusion Detection System Based on Learning Program Behavior. Recent Advances in Intrusion Detection 2000: 93-109
1999
8 Anup K. Ghosh, Aaron Schwartzbard: Analyzing the Performance of Program Behavior Profiling for Intrusion Detection. DBSec 1999: 19-32
7EEAnup K. Ghosh, Matthew Schmid, Frank Hill: Wrapping Windows NT Software for Robustness. FTCS 1999: 344-347
6 Aaron Schwartzbard, Anup K. Ghosh: A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT. Recent Advances in Intrusion Detection 1999
5EEAnup K. Ghosh: Certifying E-Commerce Software for Security. WECWIS 1999: 64-67
4EEAnup K. Ghosh, Aaron Schwartzbard, Michael Schatz: Learning Program Behavior Profiles for Intrusion Detection. Workshop on Intrusion Detection and Network Monitoring 1999: 51-62
3EEAnup K. Ghosh, Jeffrey M. Voas: Inoculating Software for Survivability. Commun. ACM 42(7): 38-44 (1999)
1998
2 Anup K. Ghosh: E-Commerce Security: No Silver Bullet. DBSec 1998: 3-16
1EEAnup K. Ghosh, Tom O'Connor, Gary McGraw: An Automated Approach for Identifying Potential Vulnerabilities in Software. IEEE Symposium on Security and Privacy 1998: 104-114

Coauthor Index

1Matt Bishop [13]
2Frank Hill [7] [16]
3Charles Howell (Chuck Howell) [14]
4Yih Huang [18]
5Sushil Jajodia [18]
6Gary McGraw [1]
7Christoph C. Michael [9] [10] [11] [15]
8Amitava Mukherjee [17]
9Tom O'Connor [1]
10Debashis Saha [17]
11Michael Schatz [4] [9]
12Matthew Schmid [7] [16]
13Aaron Schwartzbard [4] [6] [8]
14Angelos Stavrou [18]
15Tara M. Swaminatha [12]
16Jeffrey M. Voas [3]
17James A. Whittaker [13] [14]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)