dblp.uni-trier.dewww.uni-trier.de

John McHugh

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
26EECarrie Gates, John McHugh: The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors. DIMVA 2008: 228-246
25EECarlton R. Davis, Stephen Neville, José M. Fernandez, Jean-Marc Robert, John McHugh: Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?. ESORICS 2008: 461-480
2007
24EEDaniel Boteanu, José M. Fernandez, John McHugh, John Mullins: Queue Management as a DoS Counter-Measure? ISC 2007: 263-280
23EEDaniel Boteanu, Edouard Reich, José M. Fernandez, John McHugh: Implementing and testing dynamic timeout adjustment as a dos counter-measure. QoP 2007: 34-39
2006
22EEJohn McHugh: Quality of protection: measuring the unmeasurable? QoP 2006: 1-2
2004
21EEJohn McHugh: Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data. ESORICS 2004: 407-422
2003
20EEJohn McHugh, Carrie Gates: Locality: a new paradigm for thinking about normal behavior and outsider threat. NSPW 2003: 3-10
2002
19EEKymie M. C. Tan, John McHugh, Kevin S. Killourhy: Hiding Intrusions: From the Abnormal to the Normal and Beyond. Information Hiding 2002: 1-17
2001
18EEJohn McHugh: An Information Flow Tool for Gypsy. ACSAC 2001: 191-204
17EEHilary K. Browne, William A. Arbaugh, John McHugh, William L. Fithen: A Trend Analysis of Exploitations. IEEE Symposium on Security and Privacy 2001: 214-
16 Nancy R. Mead, Richard C. Linger, John McHugh, Howard F. Lipson: Managing Software Development for Survivable Systems. Ann. Software Eng. 11(1): 45-78 (2001)
15EEJohn McHugh: Intrusion and intrusion detection. Int. J. Inf. Sec. 1(1): 14-35 (2001)
2000
14EEJohn McHugh: The 1998 Lincoln Laboratory IDS Evaluation. Recent Advances in Intrusion Detection 2000: 145-161
13EEJohn McHugh: Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans. Inf. Syst. Secur. 3(4): 262-294 (2000)
12EEWilliam A. Arbaugh, William L. Fithen, John McHugh: Windows of Vulnerability: A Case Study Analysis. IEEE Computer 33(12): 52-59 (2000)
11EEJohn McHugh, Alan M. Christie, Julia Allen: Defending Yourself: The Role of Intrusion Detection Systems. IEEE Software 17(5): (2000)
1999
10 John McHugh: Chaffing at the Bit: Thoughts on a Note by Ronald Rivest. Information Hiding 1999: 395-404
1996
9EEJohn McHugh: Guest Editorial: Introduction to the Special Section. IEEE Trans. Software Eng. 22(1): 3-5 (1996)
1993
8 Jeremy Epstein, John McHugh, Hilarie K. Orman, R. Pascale, Ann B. Marmor-Squires, B. Danner, C. Martin, M. Branstad, J. Benson, D. Rothnie: A High Assurance Window System Prototype. Journal of Computer Security 2(2-3): 159-190 (1993)
1992
7EEA. H. Wadaa, Hussein M. Abdel-Wahab, John McHugh: Heuristic authentication protocol for TCP/IP network applications under UNIX. ACM Southeast Regional Conference 1992: 61-68
6EEJohn McHugh: Ada 9X and Safety Critical/Secure Systems. TRI-Ada 1992: 55-59
1988
5 John McHugh: A Formal Definition for Information Flow in the Gypsy Expression Language. CSFW 1988: 147-165
1987
4 William D. Young, John McHugh: Coding for a Believable Specification to Implementation Mapping. IEEE Symposium on Security and Privacy 1987: 140-149
3 J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young: An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Trans. Software Eng. 13(2): 157-168 (1987)
1986
2 J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young: An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Symposium on Security and Privacy 1986: 14-24
1 John McHugh, Andrew P. Moore: A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area Network. IEEE Symposium on Security and Privacy 1986: 34-39

Coauthor Index

1Hussein M. Abdel-Wahab [7]
2Julia Allen [11]
3William A. Arbaugh [12] [17]
4J. Benson [8]
5Daniel Boteanu [23] [24]
6M. Branstad [8]
7Hilary K. Browne [17]
8Alan M. Christie [11]
9B. Danner [8]
10Carlton R. Davis [25]
11Jeremy Epstein [8]
12José M. Fernandez [23] [24] [25]
13William L. Fithen [12] [17]
14Carrie Gates [20] [26]
15J. Thomas Haigh [2] [3]
16Richard A. Kemmerer [2] [3]
17Kevin S. Killourhy [19]
18Richard C. Linger [16]
19Howard F. Lipson [16]
20Ann B. Marmor-Squires [8]
21C. Martin [8]
22Nancy R. Mead [16]
23Andrew P. Moore [1]
24John Mullins [24]
25Stephen Neville [25]
26Hilarie K. Orman [8]
27R. Pascale [8]
28Edouard Reich [23]
29Jean-Marc Robert [25]
30D. Rothnie [8]
31Kymie M. C. Tan [19]
32A. H. Wadaa [7]
33William D. Young [2] [3] [4]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)