2003 |
10 | EE | Christoph C. Michael:
Finding the Vocabulary of Program Behavior Data for Anomaly Detection.
DISCEX (1) 2003: 152-163 |
2002 |
9 | EE | Christoph C. Michael,
Anup K. Ghosh:
Simple, state-based approaches to program-based anomaly detection.
ACM Trans. Inf. Syst. Secur. 5(3): 203-237 (2002) |
2001 |
8 | EE | Christoph C. Michael,
Gary McGraw,
Michael Schatz:
Generating Software Test Data by Evolution.
IEEE Trans. Software Eng. 27(12): 1085-1110 (2001) |
2000 |
7 | EE | Christoph C. Michael,
Anup K. Ghosh:
Two State-based Approaches to Program-based Anomaly Detection.
ACSAC 2000: 21- |
6 | EE | Christoph C. Michael,
Anup K. Ghosh:
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report.
Recent Advances in Intrusion Detection 2000: 66-79 |
5 | EE | Anup K. Ghosh,
Christoph C. Michael,
Michael Schatz:
A Real-Time Intrusion Detection System Based on Learning Program Behavior.
Recent Advances in Intrusion Detection 2000: 93-109 |
1998 |
4 | EE | Christoph C. Michael,
Gary McGraw:
Automated Software Test Data Generation for Complex Programs.
ASE 1998: 136-146 |
1997 |
3 | EE | Christoph C. Michael,
Gary McGraw,
Michael Schatz,
C. C. Walton:
Genetic Algorithms for Dynamic Test Data Generation.
ASE 1997: 307-308 |
2 | EE | Christoph C. Michael:
Using evolution constraints to assess the failure-proneness of evolving software.
CSMR 1997: 48-53 |
1 | | Christoph C. Michael,
Jeffrey M. Voas:
The Ability of Directed Tests to Predict Software Quality.
Ann. Software Eng. 4: 31-64 (1997) |