dblp.uni-trier.dewww.uni-trier.de

Anil Somayaji

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
15EETerri Oda, Glenn Wurster, Paul C. van Oorschot, Anil Somayaji: SOMA: mutual approval for included content in web pages. ACM Conference on Computer and Communications Security 2008: 89-98
14EEAbdulrahman Hijazi, Hajime Inoue, Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji: Discovering Packet Structure through Lightweight Hierarchical Clustering. ICC 2008: 33-39
2007
13EEHajime Inoue, Dana Jansens, Abdulrahman Hijazi, Anil Somayaji: NetADHICT: A Tool for Understanding Network Traffic. LISA 2007: 39-47
12EEKenneth L. Ingham, Anil Somayaji, John Burge, Stephanie Forrest: Learning DFA representations of HTTP for protecting web applications. Computer Networks 51(5): 1239-1255 (2007)
2005
11EEAshraf Matrawy, Paul C. van Oorschot, Anil Somayaji: Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. ACNS 2005: 104-121
10EESimon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov: Highlights from the 2005 New Security Paradigms Workshop. ACSAC 2005: 393-396
9EEYiru Li, Anil Somayaji: Securing Email Archives through User Modeling. ACSAC 2005: 547-556
8EEGlenn Wurster, Paul C. van Oorschot, Anil Somayaji: A Generic Attack on Checksumming-Based Software Tamper Resistance. IEEE Symposium on Security and Privacy 2005: 127-138
7EEEvan Hughes, Anil Somayaji: Towards Network Awareness. LISA 2005: 113-124
6EEPaul C. van Oorschot, Anil Somayaji, Glenn Wurster: Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance. IEEE Trans. Dependable Sec. Comput. 2(2): 82-92 (2005)
2004
5EEAnil Somayaji: How to Win and Evolutionary Arms Race. IEEE Security & Privacy 2(6): 70-72 (2004)
1998
4 Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji: Intrusion Detection Using Sequences of System Calls. Journal of Computer Security 6(3): 151-180 (1998)
1997
3 Stephanie Forrest, Anil Somayaji, David H. Ackley: Building Diverse Computer Systems. Workshop on Hot Topics in Operating Systems 1997: 67-72
2 Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji: Computer Immunology. Commun. ACM 40(10): 88-96 (1997)
1996
1EEStephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff: A Sense of Self for Unix Processes. IEEE Symposium on Security and Privacy 1996: 120-128

Coauthor Index

1David H. Ackley [3]
2Alex Boulatov [10]
3John Burge [12]
4Mark Bush [10]
5Simon N. Foley [10]
6Richard Ford [10]
7Stephanie Forrest [1] [2] [3] [4] [12]
8Abdulrahman Hijazi [13] [14]
9Steven A. Hofmeyr [1] [2] [4]
10Evan Hughes [7]
11Kenneth L. Ingham [12]
12Hajime Inoue [13] [14]
13Dana Jansens [13]
14Angelos D. Keromytis [10]
15Yiru Li [9]
16Michael E. Locasto [10]
17Thomas A. Longstaff [1]
18Ashraf Matrawy [11] [14]
19John McDermott [10]
20Terri Oda [15]
21Paul C. van Oorschot [6] [8] [10] [11] [14] [15]
22Stelios Sidiroglou [10]
23Abe Singer [10]
24Julie Thorpe [10]
25Glenn Wurster [6] [8] [15]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)