2008 |
18 | EE | Yih Huang,
Angelos Stavrou,
Anup K. Ghosh,
Sushil Jajodia:
Efficiently tracking application interactions using lightweight virtualization.
VMSec 2008: 19-28 |
17 | EE | Anup K. Ghosh,
Amitava Mukherjee,
Debashis Saha:
TCP throughput enhancement in wired-cum-wireless network.
Computer Communications 31(17): 4162-4166 (2008) |
2002 |
16 | EE | Matthew Schmid,
Frank Hill,
Anup K. Ghosh:
Protecting Data from Malicious Software.
ACSAC 2002: 199-208 |
15 | EE | Christoph C. Michael,
Anup K. Ghosh:
Simple, state-based approaches to program-based anomaly detection.
ACM Trans. Inf. Syst. Secur. 5(3): 203-237 (2002) |
14 | EE | Anup K. Ghosh,
Chuck Howell,
James A. Whittaker:
Building Software Securely from the Ground Up.
IEEE Software 19(1): 14-16 (2002) |
2001 |
13 | EE | Matt Bishop,
Anup K. Ghosh,
James A. Whittaker:
How Useful is Software Fault Injection for Evaluating the Security of COTS Products?
ACSAC 2001: 339-342 |
12 | EE | Anup K. Ghosh,
Tara M. Swaminatha:
Software security and privacy risks in mobile e-commerce.
Commun. ACM 44(2): 51-57 (2001) |
2000 |
11 | EE | Christoph C. Michael,
Anup K. Ghosh:
Two State-based Approaches to Program-based Anomaly Detection.
ACSAC 2000: 21- |
10 | EE | Christoph C. Michael,
Anup K. Ghosh:
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report.
Recent Advances in Intrusion Detection 2000: 66-79 |
9 | EE | Anup K. Ghosh,
Christoph C. Michael,
Michael Schatz:
A Real-Time Intrusion Detection System Based on Learning Program Behavior.
Recent Advances in Intrusion Detection 2000: 93-109 |
1999 |
8 | | Anup K. Ghosh,
Aaron Schwartzbard:
Analyzing the Performance of Program Behavior Profiling for Intrusion Detection.
DBSec 1999: 19-32 |
7 | EE | Anup K. Ghosh,
Matthew Schmid,
Frank Hill:
Wrapping Windows NT Software for Robustness.
FTCS 1999: 344-347 |
6 | | Aaron Schwartzbard,
Anup K. Ghosh:
A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT.
Recent Advances in Intrusion Detection 1999 |
5 | EE | Anup K. Ghosh:
Certifying E-Commerce Software for Security.
WECWIS 1999: 64-67 |
4 | EE | Anup K. Ghosh,
Aaron Schwartzbard,
Michael Schatz:
Learning Program Behavior Profiles for Intrusion Detection.
Workshop on Intrusion Detection and Network Monitoring 1999: 51-62 |
3 | EE | Anup K. Ghosh,
Jeffrey M. Voas:
Inoculating Software for Survivability.
Commun. ACM 42(7): 38-44 (1999) |
1998 |
2 | | Anup K. Ghosh:
E-Commerce Security: No Silver Bullet.
DBSec 1998: 3-16 |
1 | EE | Anup K. Ghosh,
Tom O'Connor,
Gary McGraw:
An Automated Approach for Identifying Potential Vulnerabilities in Software.
IEEE Symposium on Security and Privacy 1998: 104-114 |