| 2006 |
| 16 | EE | Jelena Mirkovic,
Peter L. Reiher,
Sonia Fahmy,
Roshan K. Thomas,
Alefiya Hussain,
Stephen Schwab,
Calvin Ko:
Measuring denial Of service.
QoP 2006: 53-58 |
| 15 | EE | Chinyang Henry Tseng,
Shiau-Huey Wang,
Calvin Ko,
Karl N. Levitt:
DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET.
RAID 2006: 249-271 |
| 2005 |
| 14 | EE | Tao Song,
Calvin Ko,
Chinyang Henry Tseng,
Poornima Balasubramanyam,
Anant Chaudhary,
Karl N. Levitt:
Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks.
Formal Aspects in Security and Trust 2005: 16-33 |
| 13 | | Daniel F. Sterne,
Poornima Balasubramanyam,
David Carman,
Brett Wilson,
Rajesh Talpade,
Calvin Ko,
Ravindra Balupari,
Chin-Yang Tseng,
Thomas F. Bowen,
Karl N. Levitt,
Jeff Rowe:
A General Cooperative Intrusion Detection Architecture for MANETs.
IWIA 2005: 57-70 |
| 12 | EE | Chinyang Henry Tseng,
Tao Song,
Poornima Balasubramanyam,
Calvin Ko,
Karl N. Levitt:
A Specification-Based Intrusion Detection Model for OLSR.
RAID 2005: 330-350 |
| 2004 |
| 11 | EE | Tao Song,
Calvin Ko,
Jim Alves-Foss,
Cui Zhang,
Karl N. Levitt:
Formal Reasoning About Intrusion Detection Systems.
RAID 2004: 278-295 |
| 2003 |
| 10 | EE | Calvin Ko,
Karl N. Levitt:
System Health and Intrusion Monitoring (SHIM): Project Summary.
DISCEX (2) 2003: 202-207 |
| 9 | EE | Calvin Ko:
System Health and Intrusion Monitoring: Technology Description.
DISCEX (2) 2003: 27-29 |
| 8 | EE | Paul Brutch,
Calvin Ko:
Challenges in Intrusion Detection for Wireless Ad-hoc Networks.
SAINT Workshops 2003: 368-373 |
| 7 | EE | Chin-Yang Tseng,
Poornima Balasubramanyam,
Calvin Ko,
Rattapon Limprasittiporn,
Jeff Rowe,
Karl N. Levitt:
A specification-based intrusion detection system for AODV.
SASN 2003: 125-134 |
| 2002 |
| 6 | EE | Dustin Lee,
Jeff Rowe,
Calvin Ko,
Karl N. Levitt:
Detecting and Defending against Web-Server Fingerprinting.
ACSAC 2002: 321-332 |
| 5 | EE | Calvin Ko,
Timothy Redmond:
Noninterference and Intrusion Detection.
IEEE Symposium on Security and Privacy 2002: 177-187 |
| 2001 |
| 4 | EE | Calvin Ko,
Paul Brutch,
Jeff Rowe,
Guy Tsafnat,
Karl N. Levitt:
System Health and Intrusion Monitoring Using a Hierarchy of Constraints.
Recent Advances in Intrusion Detection 2001: 190-204 |
| 2000 |
| 3 | EE | Calvin Ko:
Logic Induction of Valid Behavior Specifications for Intrusion Detection.
IEEE Symposium on Security and Privacy 2000: 142-153 |
| 1997 |
| 2 | EE | Calvin Ko,
Manfred Ruschitzka,
Karl N. Levitt:
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach.
IEEE Symposium on Security and Privacy 1997: 175-187 |
| 1993 |
| 1 | EE | Calvin Ko,
Deborah A. Frincke,
Terrance Goan,
Todd L. Heberlein,
Karl N. Levitt,
Biswanath Mukherjee,
Christopher Wee:
Analysis of an Algorithm for Distributed Recognition and Accountability.
ACM Conference on Computer and Communications Security 1993: 154-164 |