2008 |
26 | EE | Carrie Gates,
John McHugh:
The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors.
DIMVA 2008: 228-246 |
25 | EE | Carlton R. Davis,
Stephen Neville,
José M. Fernandez,
Jean-Marc Robert,
John McHugh:
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?.
ESORICS 2008: 461-480 |
2007 |
24 | EE | Daniel Boteanu,
José M. Fernandez,
John McHugh,
John Mullins:
Queue Management as a DoS Counter-Measure?
ISC 2007: 263-280 |
23 | EE | Daniel Boteanu,
Edouard Reich,
José M. Fernandez,
John McHugh:
Implementing and testing dynamic timeout adjustment as a dos counter-measure.
QoP 2007: 34-39 |
2006 |
22 | EE | John McHugh:
Quality of protection: measuring the unmeasurable?
QoP 2006: 1-2 |
2004 |
21 | EE | John McHugh:
Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data.
ESORICS 2004: 407-422 |
2003 |
20 | EE | John McHugh,
Carrie Gates:
Locality: a new paradigm for thinking about normal behavior and outsider threat.
NSPW 2003: 3-10 |
2002 |
19 | EE | Kymie M. C. Tan,
John McHugh,
Kevin S. Killourhy:
Hiding Intrusions: From the Abnormal to the Normal and Beyond.
Information Hiding 2002: 1-17 |
2001 |
18 | EE | John McHugh:
An Information Flow Tool for Gypsy.
ACSAC 2001: 191-204 |
17 | EE | Hilary K. Browne,
William A. Arbaugh,
John McHugh,
William L. Fithen:
A Trend Analysis of Exploitations.
IEEE Symposium on Security and Privacy 2001: 214- |
16 | | Nancy R. Mead,
Richard C. Linger,
John McHugh,
Howard F. Lipson:
Managing Software Development for Survivable Systems.
Ann. Software Eng. 11(1): 45-78 (2001) |
15 | EE | John McHugh:
Intrusion and intrusion detection.
Int. J. Inf. Sec. 1(1): 14-35 (2001) |
2000 |
14 | EE | John McHugh:
The 1998 Lincoln Laboratory IDS Evaluation.
Recent Advances in Intrusion Detection 2000: 145-161 |
13 | EE | John McHugh:
Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory.
ACM Trans. Inf. Syst. Secur. 3(4): 262-294 (2000) |
12 | EE | William A. Arbaugh,
William L. Fithen,
John McHugh:
Windows of Vulnerability: A Case Study Analysis.
IEEE Computer 33(12): 52-59 (2000) |
11 | EE | John McHugh,
Alan M. Christie,
Julia Allen:
Defending Yourself: The Role of Intrusion Detection Systems.
IEEE Software 17(5): (2000) |
1999 |
10 | | John McHugh:
Chaffing at the Bit: Thoughts on a Note by Ronald Rivest.
Information Hiding 1999: 395-404 |
1996 |
9 | EE | John McHugh:
Guest Editorial: Introduction to the Special Section.
IEEE Trans. Software Eng. 22(1): 3-5 (1996) |
1993 |
8 | | Jeremy Epstein,
John McHugh,
Hilarie K. Orman,
R. Pascale,
Ann B. Marmor-Squires,
B. Danner,
C. Martin,
M. Branstad,
J. Benson,
D. Rothnie:
A High Assurance Window System Prototype.
Journal of Computer Security 2(2-3): 159-190 (1993) |
1992 |
7 | EE | A. H. Wadaa,
Hussein M. Abdel-Wahab,
John McHugh:
Heuristic authentication protocol for TCP/IP network applications under UNIX.
ACM Southeast Regional Conference 1992: 61-68 |
6 | EE | John McHugh:
Ada 9X and Safety Critical/Secure Systems.
TRI-Ada 1992: 55-59 |
1988 |
5 | | John McHugh:
A Formal Definition for Information Flow in the Gypsy Expression Language.
CSFW 1988: 147-165 |
1987 |
4 | | William D. Young,
John McHugh:
Coding for a Believable Specification to Implementation Mapping.
IEEE Symposium on Security and Privacy 1987: 140-149 |
3 | | J. Thomas Haigh,
Richard A. Kemmerer,
John McHugh,
William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
IEEE Trans. Software Eng. 13(2): 157-168 (1987) |
1986 |
2 | | J. Thomas Haigh,
Richard A. Kemmerer,
John McHugh,
William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
IEEE Symposium on Security and Privacy 1986: 14-24 |
1 | | John McHugh,
Andrew P. Moore:
A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area Network.
IEEE Symposium on Security and Privacy 1986: 34-39 |