dblp.uni-trier.dewww.uni-trier.de

Calvin Ko

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
16EEJelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko: Measuring denial Of service. QoP 2006: 53-58
15EEChinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt: DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. RAID 2006: 249-271
2005
14EETao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt: Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks. Formal Aspects in Security and Trust 2005: 16-33
13 Daniel F. Sterne, Poornima Balasubramanyam, David Carman, Brett Wilson, Rajesh Talpade, Calvin Ko, Ravindra Balupari, Chin-Yang Tseng, Thomas F. Bowen, Karl N. Levitt, Jeff Rowe: A General Cooperative Intrusion Detection Architecture for MANETs. IWIA 2005: 57-70
12EEChinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt: A Specification-Based Intrusion Detection Model for OLSR. RAID 2005: 330-350
2004
11EETao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt: Formal Reasoning About Intrusion Detection Systems. RAID 2004: 278-295
2003
10EECalvin Ko, Karl N. Levitt: System Health and Intrusion Monitoring (SHIM): Project Summary. DISCEX (2) 2003: 202-207
9EECalvin Ko: System Health and Intrusion Monitoring: Technology Description. DISCEX (2) 2003: 27-29
8EEPaul Brutch, Calvin Ko: Challenges in Intrusion Detection for Wireless Ad-hoc Networks. SAINT Workshops 2003: 368-373
7EEChin-Yang Tseng, Poornima Balasubramanyam, Calvin Ko, Rattapon Limprasittiporn, Jeff Rowe, Karl N. Levitt: A specification-based intrusion detection system for AODV. SASN 2003: 125-134
2002
6EEDustin Lee, Jeff Rowe, Calvin Ko, Karl N. Levitt: Detecting and Defending against Web-Server Fingerprinting. ACSAC 2002: 321-332
5EECalvin Ko, Timothy Redmond: Noninterference and Intrusion Detection. IEEE Symposium on Security and Privacy 2002: 177-187
2001
4EECalvin Ko, Paul Brutch, Jeff Rowe, Guy Tsafnat, Karl N. Levitt: System Health and Intrusion Monitoring Using a Hierarchy of Constraints. Recent Advances in Intrusion Detection 2001: 190-204
2000
3EECalvin Ko: Logic Induction of Valid Behavior Specifications for Intrusion Detection. IEEE Symposium on Security and Privacy 2000: 142-153
1997
2EECalvin Ko, Manfred Ruschitzka, Karl N. Levitt: Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. IEEE Symposium on Security and Privacy 1997: 175-187
1993
1EECalvin Ko, Deborah A. Frincke, Terrance Goan, Todd L. Heberlein, Karl N. Levitt, Biswanath Mukherjee, Christopher Wee: Analysis of an Algorithm for Distributed Recognition and Accountability. ACM Conference on Computer and Communications Security 1993: 154-164

Coauthor Index

1Jim Alves-Foss [11]
2Poornima Balasubramanyam [7] [12] [13] [14]
3Ravindra Balupari [13]
4Thomas F. Bowen [13]
5Paul Brutch [4] [8]
6David Carman [13]
7Anant Chaudhary [14]
8Sonia Fahmy [16]
9Deborah A. Frincke [1]
10Terrance Goan [1]
11Todd L. Heberlein [1]
12Alefiya Hussain [16]
13Dustin Lee [6]
14Karl N. Levitt [1] [2] [4] [6] [7] [10] [11] [12] [13] [14] [15]
15Rattapon Limprasittiporn [7]
16Jelena Mirkovic [16]
17Biswanath Mukherjee [1]
18Timothy Redmond [5]
19Peter L. Reiher [16]
20Jeff Rowe [4] [6] [7] [13]
21Manfred Ruschitzka [2]
22Stephen Schwab [16]
23Tao Song [11] [12] [14]
24Daniel F. Sterne [13]
25Rajesh Talpade [13]
26Roshan K. Thomas [16]
27Guy Tsafnat [4]
28Chin-Yang Tseng [7] [13]
29Chinyang Henry Tseng [12] [14] [15]
30Shiau-Huey Wang [15]
31Christopher Wee [1]
32Brett Wilson [13]
33Cui Zhang [11]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)