2006 |
16 | EE | Jelena Mirkovic,
Peter L. Reiher,
Sonia Fahmy,
Roshan K. Thomas,
Alefiya Hussain,
Stephen Schwab,
Calvin Ko:
Measuring denial Of service.
QoP 2006: 53-58 |
15 | EE | Chinyang Henry Tseng,
Shiau-Huey Wang,
Calvin Ko,
Karl N. Levitt:
DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET.
RAID 2006: 249-271 |
2005 |
14 | EE | Tao Song,
Calvin Ko,
Chinyang Henry Tseng,
Poornima Balasubramanyam,
Anant Chaudhary,
Karl N. Levitt:
Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks.
Formal Aspects in Security and Trust 2005: 16-33 |
13 | | Daniel F. Sterne,
Poornima Balasubramanyam,
David Carman,
Brett Wilson,
Rajesh Talpade,
Calvin Ko,
Ravindra Balupari,
Chin-Yang Tseng,
Thomas F. Bowen,
Karl N. Levitt,
Jeff Rowe:
A General Cooperative Intrusion Detection Architecture for MANETs.
IWIA 2005: 57-70 |
12 | EE | Chinyang Henry Tseng,
Tao Song,
Poornima Balasubramanyam,
Calvin Ko,
Karl N. Levitt:
A Specification-Based Intrusion Detection Model for OLSR.
RAID 2005: 330-350 |
2004 |
11 | EE | Tao Song,
Calvin Ko,
Jim Alves-Foss,
Cui Zhang,
Karl N. Levitt:
Formal Reasoning About Intrusion Detection Systems.
RAID 2004: 278-295 |
2003 |
10 | EE | Calvin Ko,
Karl N. Levitt:
System Health and Intrusion Monitoring (SHIM): Project Summary.
DISCEX (2) 2003: 202-207 |
9 | EE | Calvin Ko:
System Health and Intrusion Monitoring: Technology Description.
DISCEX (2) 2003: 27-29 |
8 | EE | Paul Brutch,
Calvin Ko:
Challenges in Intrusion Detection for Wireless Ad-hoc Networks.
SAINT Workshops 2003: 368-373 |
7 | EE | Chin-Yang Tseng,
Poornima Balasubramanyam,
Calvin Ko,
Rattapon Limprasittiporn,
Jeff Rowe,
Karl N. Levitt:
A specification-based intrusion detection system for AODV.
SASN 2003: 125-134 |
2002 |
6 | EE | Dustin Lee,
Jeff Rowe,
Calvin Ko,
Karl N. Levitt:
Detecting and Defending against Web-Server Fingerprinting.
ACSAC 2002: 321-332 |
5 | EE | Calvin Ko,
Timothy Redmond:
Noninterference and Intrusion Detection.
IEEE Symposium on Security and Privacy 2002: 177-187 |
2001 |
4 | EE | Calvin Ko,
Paul Brutch,
Jeff Rowe,
Guy Tsafnat,
Karl N. Levitt:
System Health and Intrusion Monitoring Using a Hierarchy of Constraints.
Recent Advances in Intrusion Detection 2001: 190-204 |
2000 |
3 | EE | Calvin Ko:
Logic Induction of Valid Behavior Specifications for Intrusion Detection.
IEEE Symposium on Security and Privacy 2000: 142-153 |
1997 |
2 | EE | Calvin Ko,
Manfred Ruschitzka,
Karl N. Levitt:
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach.
IEEE Symposium on Security and Privacy 1997: 175-187 |
1993 |
1 | EE | Calvin Ko,
Deborah A. Frincke,
Terrance Goan,
Todd L. Heberlein,
Karl N. Levitt,
Biswanath Mukherjee,
Christopher Wee:
Analysis of an Algorithm for Distributed Recognition and Accountability.
ACM Conference on Computer and Communications Security 1993: 154-164 |