2006 |
10 | EE | Jeffery P. Hansen,
Kymie M. C. Tan,
Roy A. Maxion:
Anomaly Detector Performance Evaluation Using a Parameterized Environment.
RAID 2006: 106-126 |
2005 |
9 | EE | Kymie M. C. Tan,
Roy A. Maxion:
The Effects of Algorithmic Diversity on Anomaly Detector Performance.
DSN 2005: 216-225 |
2004 |
8 | EE | Kevin S. Killourhy,
Roy A. Maxion,
Kymie M. C. Tan:
A Defense-Centric Taxonomy Based on Attack Manifestations.
DSN 2004: 102- |
2002 |
7 | EE | Kymie M. C. Tan,
Roy A. Maxion:
"Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector.
IEEE Symposium on Security and Privacy 2002: 188-201 |
6 | EE | Kymie M. C. Tan,
John McHugh,
Kevin S. Killourhy:
Hiding Intrusions: From the Abnormal to the Normal and Beyond.
Information Hiding 2002: 1-17 |
5 | EE | Kymie M. C. Tan,
Kevin S. Killourhy,
Roy A. Maxion:
Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits.
RAID 2002: 54-73 |
4 | EE | Roy A. Maxion,
Kymie M. C. Tan:
Anomaly Detection in Embedded Systems.
IEEE Trans. Computers 51(2): 108-120 (2002) |
2001 |
3 | EE | Somesh Jha,
Kymie M. C. Tan,
Roy A. Maxion:
Markov Chains, Classifiers, and Intrusion Detection.
CSFW 2001: 206-219 |
2000 |
2 | EE | Roy A. Maxion,
Kymie M. C. Tan:
Benchmarking Anomaly-Based Detection Systems.
DSN 2000: 623-630 |
1997 |
1 | EE | Kymie M. C. Tan,
Blair R. Collie:
Detection and Classification of TCP/IP Network Services.
ACSAC 1997: 99-107 |