dblp.uni-trier.dewww.uni-trier.de

Karl N. Levitt

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
73EEXiaoming Lu, Matt Spear, Karl N. Levitt, Norman S. Matloff, Shyhtsun Felix Wu: Using Soft-Line Recursive Response to Improve Query Aggregation in Wireless Sensor Networks. ICC 2008: 2309-2316
72EEXiaoming Lu, Matt Spear, Karl N. Levitt, Shyhtsun Felix Wu: iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks. INFOCOM 2008: 968-976
71EESenthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe: Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. RAID 2008: 231-250
70EEXiaoming Lu, Matt Spear, Karl N. Levitt, Norman S. Matloff, Shyhtsun Felix Wu: A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. SECURWARE 2008: 403-411
2007
69EELynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis Hsu, Karl N. Levitt: A framework for diversifying windows native APIs to tolerate code injection attacks. ASIACCS 2007: 392-394
68EEChinyang Henry Tseng, Shiau-Huey Wang, Karl N. Levitt: DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET. ASIACCS 2007: 395-397
67EECynthia E. Irvine, Karl N. Levitt: Trusted Hardware: Can It Be Trustworthy? DAC 2007: 1-4
66EEShiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matthew Bishop: Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. RAID 2007: 127-145
2006
65EEEbrima N. Ceesay, Jingmin Zhou, Michael Gertz, Karl N. Levitt, Matt Bishop: Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs. DIMVA 2006: 1-16
64EESenthilkumar G. Cheetancheri, Denys L. Ma, Karl N. Levitt, Todd L. Heberlein: Towards a framework for worm-defense evaluation. IPCCC 2006
63EERick Crawford, Matt Bishop, Bhume Bhumiratana, Lisa Clark, Karl N. Levitt: Sanitization models and their limitations. NSPW 2006: 41-56
62EEChinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt: DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. RAID 2006: 249-271
61EEMatt Bishop, Rick Crawford, Bhume Bhumiratana, Lisa Clark, Karl N. Levitt: Some Problems in Sanitizing Network Data. WETICE 2006: 307-312
2005
60EETao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt: Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks. Formal Aspects in Security and Trust 2005: 16-33
59 Daniel F. Sterne, Poornima Balasubramanyam, David Carman, Brett Wilson, Rajesh Talpade, Calvin Ko, Ravindra Balupari, Chin-Yang Tseng, Thomas F. Bowen, Karl N. Levitt, Jeff Rowe: A General Cooperative Intrusion Detection Architecture for MANETs. IWIA 2005: 57-70
58EEChinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt: A Specification-Based Intrusion Detection Model for OLSR. RAID 2005: 330-350
2004
57EEArchana Pasupulati, Jason Coit, Karl N. Levitt, Shyhtsun Felix Wu, S. H. Li, J. C. Kuo, K. P. Fan: Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities. NOMS (1) 2004: 235-248
56EETao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt: Formal Reasoning About Intrusion Detection Systems. RAID 2004: 278-295
55EEMatt Bishop, Bhume Bhumiratana, Rick Crawford, Karl N. Levitt: How to Sanitize Data. WETICE 2004: 217-222
54EEPhillip A. Porras, Linda Briesemeister, Keith Skinner, Karl N. Levitt, Jeff Rowe, Yu-Cheng Allen Ting: A hybrid quarantine defense. WORM 2004: 73-82
53EERuzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu: Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004)
2003
52EETye Stallard, Karl N. Levitt: Automated Analysis for Digital Forensic Science: Semantic Integrity Checking. ACSAC 2003: 160-169
51EED. Nojiri, Jeff Rowe, Karl N. Levitt: Cooperative Response Strategies for Large Scale Attack Mitigation. DISCEX (1) 2003: 293-302
50EECalvin Ko, Karl N. Levitt: System Health and Intrusion Monitoring (SHIM): Project Summary. DISCEX (2) 2003: 202-207
49 Melissa Danforth, Karl N. Levitt: Immune System Model for Detecting Web Server Attacks. ICMLA 2003: 161-167
48EEMarcus Tylutki, Karl N. Levitt: Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. RAID 2003: 1-16
47EEIvan Balepin, Sergei Maltsev, Jeff Rowe, Karl N. Levitt: Using Specification-Based Intrusion Detection for Automated Response. RAID 2003: 136-154
46EEChin-Yang Tseng, Poornima Balasubramanyam, Calvin Ko, Rattapon Limprasittiporn, Jeff Rowe, Karl N. Levitt: A specification-based intrusion detection system for AODV. SASN 2003: 125-134
2002
45EEDustin Lee, Jeff Rowe, Calvin Ko, Karl N. Levitt: Detecting and Defending against Web-Server Fingerprinting. ACSAC 2002: 321-332
44EEKarl N. Levitt: Intrusion Detection: Current Capabilities and Future Directions. ACSAC 2002: 365-370
43EEJames C. Reynolds, James E. Just, Ed Lawson, Larry A. Clough, Ryan Maglich, Karl N. Levitt: The Design and Implementation of an Intrusion Tolerant System. DSN 2002: 285-292
42EEJames E. Just, James C. Reynolds, Larry A. Clough, Melissa Danforth, Karl N. Levitt, Ryan Maglich, Jeff Rowe: Learning Unknown Attacks - A Start. RAID 2002: 158-176
2001
41EECalvin Ko, Paul Brutch, Jeff Rowe, Guy Tsafnat, Karl N. Levitt: System Health and Intrusion Monitoring Using a Hierarchy of Constraints. Recent Advances in Intrusion Detection 2001: 190-204
2000
40 Christina Yip Chung, Michael Gertz, Karl N. Levitt: Discovery of Multi-Level Security Policies. DBSec 2000: 173-184
39EESteven Cheung, Karl N. Levitt: A Formal-Specification Based Approach for Protecting the Domain Name System. DSN 2000: 641-
38EERichard J. Feiertag, Stuart Staniford-Chen, Karl N. Levitt, Mark Heckman, Dave Peticolas, Rick Crawford, Lee Benzinger, Sue Rho, Stephen Wu: Intrusion detection inter-component adaptive negotiation. Computer Networks 34(4): 605-621 (2000)
1999
37 Christina Yip Chung, Michael Gertz, Karl N. Levitt: DEMIDS: A Misuse Detection System for Database Systems. IICIS 1999: 159-178
36EERichard J. Feiertag, Stuart Staniford-Chen, Karl N. Levitt, Mark Heckman, Dave Peticolas, Rick Crawford, Lee Benzinger, Sue Rho, Stephen Wu: Intrusion Detection Inter-component Adaptive Negotiation. Recent Advances in Intrusion Detection 1999
35EEChristina Yip Chung, Michael Gertz, Karl N. Levitt: Misuse Detection in Database Systems Through User Profiling. Recent Advances in Intrusion Detection 1999
34 Cui Zhang, Brian R. Becker, Dave Peticolas, Ronald A. Olsson, Karl N. Levitt: LVT: A Layered Verification Technique for Distributed Computing Systems. Softw. Test., Verif. Reliab. 9(2): 107-133 (1999)
33EECui Zhang, Ronald A. Olsson, Karl N. Levitt: Formal Verification of a Programming Logic for a Distributed Programming Language. Theor. Comput. Sci. 216(1-2): 213-235 (1999)
1998
32EERaymond W. Yip, Karl N. Levitt: Data Level Inference Detection in Database Systems. CSFW 1998: 179-189
31 Raymond W. Yip, Karl N. Levitt: The Design and Implementation of a Data Level Database Inference Detection System. DBSec 1998: 253-266
30EEMark Heckman, Karl N. Levitt: Applying the Composition Principle to Verify a Hierarchy of Security Servers. HICSS (3) 1998: 338-347
29EEJames A. Hoagland, Raju Pandey, Karl N. Levitt: Security Policy Specification Using a Graphical Approach CoRR cs.CR/9809124: (1998)
1997
28EECui Zhang, Brian R. Becker, Dave Peticolas, Mark Heckman, Karl N. Levitt, Ronald A. Olsson: Verification of a Distributed Computing. HICSS (5) 1997: 252-261
27EECalvin Ko, Manfred Ruschitzka, Karl N. Levitt: Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. IEEE Symposium on Security and Privacy 1997: 175-187
26 Raymond W. Lo, Karl N. Levitt, Ronald A. Olsson: Validation of Array Accesses: Integration of Flow Analysis and Program Verification Techniques. Softw. Test., Verif. Reliab. 7(4): 201-227 (1997)
1996
25 Mark Heckman, Cui Zhang, Brian R. Becker, Dave Peticolas, Karl N. Levitt, Ronald A. Olsson: Towards Applying the Composition Principle to Verify a Microkernel Operating System. TPHOLs 1996: 235-250
1995
24 Cui Zhang, Brian R. Becker, Mark Heckman, Karl N. Levitt, Ronald A. Olsson: A Hierarchical Method for Reasoning about Distributed Programming Languages. TPHOLs 1995: 385-400
23EERaymond W. Lo, Karl N. Levitt, Ronald A. Olsson: MCF: a malicious code filter. Computers & Security 14(6): 541-566 (1995)
1993
22EECalvin Ko, Deborah A. Frincke, Terrance Goan, Todd L. Heberlein, Karl N. Levitt, Biswanath Mukherjee, Christopher Wee: Analysis of an Algorithm for Distributed Recognition and Accountability. ACM Conference on Computer and Communications Security 1993: 154-164
21 Tej Arora, Tony Leung, Karl N. Levitt, E. Thomas Schubert, Phillip J. Windley: Report on the UCD Microcoded Viper Verification Project. HUG 1993: 239-252
20 Cui Zhang, Robert J. Shaw, Ronald A. Olsson, Karl N. Levitt, Myla Archer, Mark Heckman, Gregory D. Benson: Mechanizing a Programming Logic for the Concurrent Programming Language microSR in HOL. HUG 1993: 29-42
1992
19 Myla Archer, Jeffrey J. Joyce, Karl N. Levitt, Phillip J. Windley: Proceedings of the 1991 International Workshop on the HOL Theorem Proving System and its Applications, August 1991, Davis, California, USA IEEE Computer Society 1992
18 William L. Harrison, Myla Archer, Karl N. Levitt: A HOL Mechanisation of the Axiomatic Semantics of a Simple Distributed Programming Language. TPHOLs 1992: 347-356
17 Saraswati Kalvala, Myla Archer, Karl N. Levitt: Implementation and Use of Annotations in HOL. TPHOLs 1992: 407-426
16 Jing Pan, Karl N. Levitt, Myla Archer, Saraswati Kalvala: Towards a Formal Verification of a Floating Point Coprocessor and its Composition with a Central Processing Unit. TPHOLs 1992: 427-447
1991
15 Jim Alves-Foss, Karl N. Levitt: Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components. IEEE Symposium on Security and Privacy 1991: 122-135
14 Deborah A. Frincke, Myla Archer, Karl N. Levitt: CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms. KBSE 1991: 151-160
13 William L. Harrison, Karl N. Levitt: Mechanizing Security in HOL. TPHOLs 1991: 63-66
1990
12 L. Todd Herberlein, Gihan V. Dias, Karl N. Levitt, Biswanath Mukherjee, Jeff Wood, David Wolber: A Network Security Monitor. IEEE Symposium on Security and Privacy 1990: 296-305
1979
11 Karl N. Levitt, Lawrence Robinson, Brad A. Silverberg: Writing Simulatable Specifications in SPECIAL. The Use of Formal Specification of Software 1979: 39-78
1978
10 Jay M. Spitzen, Karl N. Levitt, Lawrence Robinson: An Example of Hierarchical Design and Proof. Commun. ACM 21(12): 1064-1075 (1978)
1977
9 Richard J. Feiertag, Karl N. Levitt, Lawrence Robinson: Proving Multilevel Security of a System Design. SOSP 1977: 57-65
8 Lawrence Robinson, Karl N. Levitt: Proof Techniques for Hierarchically Structured Programs. Commun. ACM 20(4): 271-283 (1977)
1976
7 Peter G. Neumann, Richard J. Feiertag, Karl N. Levitt, Lawrence Robinson: Software Development and Proofs of Multi-Level Security. ICSE 1976: 421-428
6 John H. Wensley, Milton W. Green, Karl N. Levitt, Robert E. Shostak: The Design, Analysis, and Verification of the SIFT Fault-Tolerant System. ICSE 1976: 458-469
1974
5 Richard J. Waldinger, Karl N. Levitt: Reasoning about Programs. Artif. Intell. 5(3): 235-316 (1974)
1973
4 Richard J. Waldinger, Karl N. Levitt: Reasoning About Programs. POPL 1973: 169-182
1972
3 Bernard Elspas, Karl N. Levitt, Richard J. Waldinger, Abraham Waksman: An Assessment of Techniques for Proving Program Correctness. ACM Comput. Surv. 4(2): 97-147 (1972)
2 Karl N. Levitt, William H. Kautz: Cellular Arrays for the Solution of Graph Problems. Commun. ACM 15(9): 789-801 (1972)
1968
1EEKarl N. Levitt, Milton W. Green, Jack Goldberg: A study of the data commutation problems in a self-repairable multiprocessor. AFIPS Spring Joint Computing Conference 1968: 515-527

Coauthor Index

1John Mark Agosta [71]
2Jim Alves-Foss [15] [56]
3Myla Archer [14] [16] [17] [18] [19] [20]
4Tej Arora [21]
5Ruzena Bajcsy [53]
6Poornima Balasubramanyam [46] [58] [59] [60]
7Ivan Balepin [47]
8Ravindra Balupari [59]
9Brian R. Becker [24] [25] [28] [34]
10Gregory D. Benson [20]
11Terry Benzel [53]
12Lee Benzinger [36] [38]
13Bhume Bhumiratana [55] [61] [63]
14Matt Bishop [53] [55] [61] [63] [65]
15Matthew Bishop [66]
16Thomas F. Bowen [59]
17Robert Braden [53]
18Linda Briesemeister [54]
19Carla E. Brodley [53]
20Paul Brutch [41]
21David Carman [59]
22Ebrima N. Ceesay [65]
23Anant Chaudhary [60]
24Senthilkumar G. Cheetancheri [64] [71]
25Steven Cheung [39]
26Christina Yip Chung [35] [37] [40]
27Lisa Clark [61] [63]
28Larry A. Clough [42] [43]
29Jason Coit [57]
30Rick Crawford [36] [38] [55] [61] [63]
31Melissa Danforth [42] [49]
32Tufan Demir [69]
33Gihan V. Dias [12]
34Bernard Elspas [3]
35Sonia Fahmy [53]
36K. P. Fan [57]
37Richard J. Feiertag [7] [9] [36] [38]
38Sally Floyd [53]
39Deborah A. Frincke [14] [22]
40Michael Gertz [35] [37] [40] [65]
41Terrance Goan [22]
42Jack Goldberg [1]
43Milton W. Green [1] [6]
44W. Hardaker [53]
45William L. Harrison [13] [18]
46Todd L. Heberlein [22] [64]
47Mark Heckman [20] [24] [25] [28] [30] [36] [38]
48L. Todd Herberlein [12]
49James A. Hoagland [29]
50Francis Hsu [69]
51Cynthia E. Irvine [67]
52Anthony D. Joseph [53]
53Jeffrey J. Joyce [19]
54James E. Just [42] [43]
55Sara Kalvala (Saraswati Kalvala) [16] [17]
56William H. Kautz [2]
57George Kesidis [53]
58Calvin Ko [22] [27] [41] [45] [46] [50] [56] [58] [59] [60] [62]
59J. C. Kuo [57]
60Ed Lawson [43]
61Dustin Lee [45]
62Tony Leung [21]
63S. H. Li [57]
64Rattapon Limprasittiporn [46]
65Robert Lindell [53]
66Peng Liu [53]
67Raymond W. Lo [23] [26]
68Xiaoming Lu [70] [72] [73]
69Denys L. Ma [64]
70Ryan Maglich [42] [43]
71Sergei Maltsev [47]
72Norman S. Matloff [70] [73]
73David Miller [53]
74Biswanath Mukherjee [12] [22]
75Russ Mundy [53]
76Cliford Neuman [53]
77Peter G. Neumann [7]
78Lynette Qu Nguyen [69]
79D. Nojiri [51]
80Ronald A. Olsson [20] [23] [24] [25] [26] [28] [33] [34]
81Ron Ostrenga [53]
82Jing Pan [16]
83Raju Pandey [29]
84Archana Pasupulati [57]
85Vern Paxson [53]
86Dave Peticolas [25] [28] [34] [36] [38]
87Phillip A. Porras [53] [54]
88James C. Reynolds [42] [43]
89Sue Rho [36] [38]
90Lawrence Robinson [7] [8] [9] [10] [11]
91Catherine Rosenberg [53]
92Jeff Rowe [41] [42] [45] [46] [47] [51] [54] [59] [69] [71]
93Manfred Ruschitzka [27]
94Shankar Sastry (Shankar S. Sastry) [53]
95E. Thomas Schubert [21]
96Robert J. Shaw [20]
97Robert E. Shostak [6]
98Brad A. Silverberg [11]
99Keith Skinner [54]
100Tao Song [56] [58] [60]
101Matt Spear [70] [72] [73]
102Jay M. Spitzen [10]
103Tye Stallard [52]
104Stuart Staniford-Chen (Stuart Staniford) [36] [38]
105Daniel F. Sterne [53] [59]
106Rajesh Talpade [59]
107Yu-Cheng Allen Ting [54]
108Guy Tsafnat [41]
109Chin-Yang Tseng [46] [59]
110Chinyang Henry Tseng [58] [60] [62] [66] [68]
111J. Doug Tygar (J. D. Tygar) [53]
112Marcus Tylutki [48]
113Abraham Waksman [3]
114Richard J. Waldinger [3] [4] [5]
115Shiau-Huey Wang [62] [66] [68]
116Christopher Wee [22]
117John H. Wensley [6]
118Brett Wilson [59]
119Phillip J. Windley [19] [21]
120David Wolber [12]
121Jeff Wood [12]
122Shyhtsun Felix Wu [53] [57] [70] [71] [72] [73]
123Stephen Wu [36] [38]
124Raymond W. Yip [31] [32]
125Cui Zhang [20] [24] [25] [28] [33] [34] [56]
126Jingmin Zhou [65]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)