2007 |
12 | EE | Jingmin Zhou,
Mark Heckman,
Brennen Reynolds,
Adam Carlson,
Matt Bishop:
Modeling network intrusion detection alerts for correlation.
ACM Trans. Inf. Syst. Secur. 10(1): (2007) |
2000 |
11 | EE | Richard J. Feiertag,
Stuart Staniford-Chen,
Karl N. Levitt,
Mark Heckman,
Dave Peticolas,
Rick Crawford,
Lee Benzinger,
Sue Rho,
Stephen Wu:
Intrusion detection inter-component adaptive negotiation.
Computer Networks 34(4): 605-621 (2000) |
1999 |
10 | EE | Richard J. Feiertag,
Stuart Staniford-Chen,
Karl N. Levitt,
Mark Heckman,
Dave Peticolas,
Rick Crawford,
Lee Benzinger,
Sue Rho,
Stephen Wu:
Intrusion Detection Inter-component Adaptive Negotiation.
Recent Advances in Intrusion Detection 1999 |
1998 |
9 | EE | Mark Heckman,
Karl N. Levitt:
Applying the Composition Principle to Verify a Hierarchy of Security Servers.
HICSS (3) 1998: 338-347 |
1997 |
8 | EE | Cui Zhang,
Brian R. Becker,
Dave Peticolas,
Mark Heckman,
Karl N. Levitt,
Ronald A. Olsson:
Verification of a Distributed Computing.
HICSS (5) 1997: 252-261 |
1996 |
7 | | Mark Heckman,
Cui Zhang,
Brian R. Becker,
Dave Peticolas,
Karl N. Levitt,
Ronald A. Olsson:
Towards Applying the Composition Principle to Verify a Microkernel Operating System.
TPHOLs 1996: 235-250 |
1995 |
6 | | Cui Zhang,
Brian R. Becker,
Mark Heckman,
Karl N. Levitt,
Ronald A. Olsson:
A Hierarchical Method for Reasoning about Distributed Programming Languages.
TPHOLs 1995: 385-400 |
1993 |
5 | | Cui Zhang,
Robert J. Shaw,
Ronald A. Olsson,
Karl N. Levitt,
Myla Archer,
Mark Heckman,
Gregory D. Benson:
Mechanizing a Programming Logic for the Concurrent Programming Language microSR in HOL.
HUG 1993: 29-42 |
1990 |
4 | EE | Teresa F. Lunt,
Dorothy E. Denning,
Roger R. Schell,
Mark Heckman,
William R. Shockley:
The SeaView Security Model.
IEEE Trans. Software Eng. 16(6): 593-607 (1990) |
1987 |
3 | | Dorothy E. Denning,
Teresa F. Lunt,
Roger R. Schell,
Mark Heckman,
William R. Shockley:
A Multilevel Relational Data Model.
IEEE Symposium on Security and Privacy 1987: 220-234 |
2 | | Dorothy E. Denning,
Selim G. Akl,
Mark Heckman,
Teresa F. Lunt,
Matthew Morgenstern,
Peter G. Neumann,
Roger R. Schell:
Views for Multilevel Database Security.
IEEE Trans. Software Eng. 13(2): 129-140 (1987) |
1986 |
1 | | Dorothy E. Denning,
Selim G. Akl,
Matthew Morgenstern,
Peter G. Neumann,
Roger R. Schell,
Mark Heckman:
Views for Multilevel Database Security.
IEEE Symposium on Security and Privacy 1986: 156-172 |