BibTeX records: Anup K. Ghosh

download as .bib file

@book{DBLP:series/ais/100,
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Moving Target Defense {II} - Application of Game Theory and Adversarial
                  Modeling},
  series       = {Advances in Information Security},
  volume       = {100},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-5416-8},
  doi          = {10.1007/978-1-4614-5416-8},
  isbn         = {978-1-4614-5415-1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/100.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GhoshM12,
  author       = {Anup K. Ghosh and
                  Gary McGraw},
  title        = {Lost Decade or Golden Era: Computer Security since 9/11},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {10},
  number       = {1},
  pages        = {6--10},
  year         = {2012},
  url          = {https://doi.org/10.1109/MSP.2012.12},
  doi          = {10.1109/MSP.2012.12},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GhoshM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/LocastoGJS11,
  author       = {Michael E. Locasto and
                  Anup K. Ghosh and
                  Sushil Jajodia and
                  Angelos Stavrou},
  title        = {The ephemeral legion: producing an expert cyber-security work force
                  from thin air},
  journal      = {Commun. {ACM}},
  volume       = {54},
  number       = {1},
  pages        = {129--131},
  year         = {2011},
  url          = {https://doi.org/10.1145/1866739.1866764},
  doi          = {10.1145/1866739.1866764},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/LocastoGJS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/KeromytisSYSGED11,
  author       = {Angelos D. Keromytis and
                  Salvatore J. Stolfo and
                  Junfeng Yang and
                  Angelos Stavrou and
                  Anup K. Ghosh and
                  Dawson R. Engler and
                  Marc Dacier and
                  Matthew C. Elder and
                  Darrell M. Kienzle},
  title        = {The {MINESTRONE} Architecture Combining Static and Dynamic Analysis
                  Techniques for Software Security},
  booktitle    = {First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands,
                  July 6, 2011},
  pages        = {53--56},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.ieeecomputersociety.org/10.1109/SysSec.2011.33},
  doi          = {10.1109/SYSSEC.2011.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/KeromytisSYSGED11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LeWJSGJ11,
  author       = {Meixing Le and
                  Zhaohui Wang and
                  Quan Jia and
                  Angelos Stavrou and
                  Anup K. Ghosh and
                  Sushil Jajodia},
  editor       = {Muttukrishnan Rajarajan and
                  Fred Piper and
                  Haining Wang and
                  George Kesidis},
  title        = {Trading Elephants for Ants: Efficient Post-attack Reconstitution},
  booktitle    = {Security and Privacy in Communication Networks - 7th International
                  {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {96},
  pages        = {460--469},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31909-9\_27},
  doi          = {10.1007/978-3-642-31909-9\_27},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/LeWJSGJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/HuangG11,
  author       = {Yih Huang and
                  Anup K. Ghosh},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Introducing Diversity and Uncertainty to Create Moving Attack Surfaces
                  for Web Services},
  booktitle    = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber
                  Threats},
  series       = {Advances in Information Security},
  volume       = {54},
  pages        = {131--151},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-0977-9\_8},
  doi          = {10.1007/978-1-4614-0977-9\_8},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/HuangG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/54,
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber
                  Threats},
  series       = {Advances in Information Security},
  volume       = {54},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-0977-9},
  doi          = {10.1007/978-1-4614-0977-9},
  isbn         = {978-1-4614-0976-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/54.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/HuangGBM10,
  author       = {Yih Huang and
                  Anup K. Ghosh and
                  Tom Bracewell and
                  Brian Mastropietro},
  title        = {A security evaluation of a novel resilient web serving architecture:
                  Lessons learned through industry/academia collaboration},
  booktitle    = {{IEEE/IFIP} International Conference on Dependable Systems and Networks
                  Workshops {(DSN-W} 2010), Chicago, Illinois, USA, June 28 - July 1,
                  2010},
  pages        = {188--193},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DSNW.2010.5542597},
  doi          = {10.1109/DSNW.2010.5542597},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/HuangGBM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/WangHG10,
  author       = {Jiang Wang and
                  Yih Huang and
                  Anup K. Ghosh},
  title        = {SafeFox: {A} Safe Lightweight Virtual Browsing Environment},
  booktitle    = {43rd Hawaii International International Conference on Systems Science
                  {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI,
                  {USA}},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HICSS.2010.324},
  doi          = {10.1109/HICSS.2010.324},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/WangHG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/WangNSG10,
  author       = {Jiang Wang and
                  Sameer Niphadkar and
                  Angelos Stavrou and
                  Anup K. Ghosh},
  title        = {A Virtualization Architecture for In-Depth Kernel Isolation},
  booktitle    = {43rd Hawaii International International Conference on Systems Science
                  {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI,
                  {USA}},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HICSS.2010.41},
  doi          = {10.1109/HICSS.2010.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/WangNSG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangSG10,
  author       = {Jiang Wang and
                  Angelos Stavrou and
                  Anup K. Ghosh},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {HyperCheck: {A} Hardware-Assisted Integrity Monitor},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {158--177},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_9},
  doi          = {10.1007/978-3-642-15512-3\_9},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/WangSG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/HuangG09,
  author       = {Yih Huang and
                  Anup K. Ghosh},
  title        = {Automating Intrusion Response via Virtualization for Realizing Uninterruptible
                  Web Services},
  booktitle    = {Proceedings of The Eighth {IEEE} International Symposium on Networking
                  Computing and Applications, {NCA} 2009, July 9-11, 2009, Cambridge,
                  Massachusetts, {USA}},
  pages        = {114--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NCA.2009.37},
  doi          = {10.1109/NCA.2009.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/HuangG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/GhoshMS08,
  author       = {Anup K. Ghosh and
                  Amitava Mukherjee and
                  Debashis Saha},
  title        = {{TCP} throughput enhancement in wired-cum-wireless network},
  journal      = {Comput. Commun.},
  volume       = {31},
  number       = {17},
  pages        = {4162--4166},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.comcom.2008.09.017},
  doi          = {10.1016/J.COMCOM.2008.09.017},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/GhoshMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuangSGJ08,
  author       = {Yih Huang and
                  Angelos Stavrou and
                  Anup K. Ghosh and
                  Sushil Jajodia},
  editor       = {Jason Nieh and
                  Angelos Stavrou},
  title        = {Efficiently tracking application interactions using lightweight virtualization},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Virtual Machine Security,
                  VMSec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {19--28},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456482.1456486},
  doi          = {10.1145/1456482.1456486},
  timestamp    = {Wed, 04 May 2022 13:02:17 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HuangSGJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/WangGH08,
  author       = {Jiang Wang and
                  Anup K. Ghosh and
                  Yih Huang},
  editor       = {Elisa Bertino and
                  James B. D. Joshi},
  title        = {Web Canary: {A} Virtualized Web Browser to Support Large-Scale Silent
                  Collaboration in Detecting Malicious Web Sites},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing,
                  4th International Conference, CollaborateCom 2008, Orlando, FL, USA,
                  November 13-16, 2008, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {10},
  pages        = {24--33},
  publisher    = {Springer / {ICST}},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-03354-4\_3},
  doi          = {10.1007/978-3-642-03354-4\_3},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/WangGH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GagnonTG07,
  author       = {Michael N. Gagnon and
                  Stephen Taylor and
                  Anup K. Ghosh},
  title        = {Software Protection through Anti-Debugging},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {5},
  number       = {3},
  pages        = {82--84},
  year         = {2007},
  url          = {https://doi.org/10.1109/MSP.2007.71},
  doi          = {10.1109/MSP.2007.71},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GagnonTG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/GhoshDRM07,
  author       = {Anup K. Ghosh and
                  Sudipto Das and
                  Rajesh Roy and
                  Amitava Mukherjee},
  title        = {Sender Side Intelligence for {TCP} Throughput Enhancement in Wired-Cum-Wireless
                  Network},
  booktitle    = {Proceedings of the {IEEE} 18th International Symposium on Personal,
                  Indoor and Mobile Radio Communications, {PIMRC} 2007, 3-7 September
                  2007, Athens, Greece},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/PIMRC.2007.4394381},
  doi          = {10.1109/PIMRC.2007.4394381},
  timestamp    = {Fri, 11 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/GhoshDRM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/software/GhoshHW02,
  author       = {Anup K. Ghosh and
                  Chuck Howell and
                  James A. Whittaker},
  title        = {Building Software Securely from the Ground Up},
  journal      = {{IEEE} Softw.},
  volume       = {19},
  number       = {1},
  pages        = {14--16},
  year         = {2002},
  url          = {https://doi.org/10.1109/MS.2002.976936},
  doi          = {10.1109/MS.2002.976936},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/software/GhoshHW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MichaelG02,
  author       = {Christoph C. Michael and
                  Anup K. Ghosh},
  title        = {Simple, state-based approaches to program-based anomaly detection},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {203--237},
  year         = {2002},
  url          = {https://doi.org/10.1145/545186.545187},
  doi          = {10.1145/545186.545187},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MichaelG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchmidHG02,
  author       = {Matthew Schmid and
                  Frank Hill and
                  Anup K. Ghosh},
  title        = {Protecting Data from Malicious Software},
  booktitle    = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
                  9-13 December 2002, Las Vegas, NV, {USA}},
  pages        = {199--208},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSAC.2002.1176291},
  doi          = {10.1109/CSAC.2002.1176291},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SchmidHG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/GhoshS01,
  author       = {Anup K. Ghosh and
                  Tara M. Swaminatha},
  title        = {Software security and privacy risks in mobile e-commerce},
  journal      = {Commun. {ACM}},
  volume       = {44},
  number       = {2},
  pages        = {51--57},
  year         = {2001},
  url          = {https://doi.org/10.1145/359205.359227},
  doi          = {10.1145/359205.359227},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/GhoshS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BishopGW01,
  author       = {Matt Bishop and
                  Anup K. Ghosh and
                  James A. Whittaker},
  title        = {How Useful is Software Fault Injection for Evaluating the Security
                  of {COTS} Products?},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {339--340},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ACSAC.2001.10009},
  doi          = {10.1109/ACSAC.2001.10009},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BishopGW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Ghosh01,
  author       = {Anup K. Ghosh},
  editor       = {Anup K. Ghosh},
  title        = {New Security Issues in Mobile E-Commerce},
  booktitle    = {E-Commerce Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {2},
  pages        = {29--46},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-1-4615-1467-1\_3},
  doi          = {10.1007/978-1-4615-1467-1\_3},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Ghosh01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/2,
  editor       = {Anup K. Ghosh},
  title        = {E-Commerce Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {2},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-1-4615-1467-1},
  doi          = {10.1007/978-1-4615-1467-1},
  isbn         = {0-7923-7399-5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MichaelG00,
  author       = {Christoph C. Michael and
                  Anup K. Ghosh},
  title        = {Two State-based Approaches to Program-based Anomaly Detection},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {21},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898854},
  doi          = {10.1109/ACSAC.2000.898854},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MichaelG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MichaelG00,
  author       = {Christoph C. Michael and
                  Anup K. Ghosh},
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {Using Finite Automata to Mine Execution Data for Intrusion Detection:
                  {A} Preliminary Report},
  booktitle    = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  pages        = {66--79},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3\_5},
  doi          = {10.1007/3-540-39945-3\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MichaelG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GhoshMS00,
  author       = {Anup K. Ghosh and
                  Christoph C. Michael and
                  Michael Schatz},
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {A Real-Time Intrusion Detection System Based on Learning Program Behavior},
  booktitle    = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  pages        = {93--109},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3\_7},
  doi          = {10.1007/3-540-39945-3\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GhoshMS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/GhoshV99,
  author       = {Anup K. Ghosh and
                  Jeffrey M. Voas},
  title        = {Inoculating Software for Survivability},
  journal      = {Commun. {ACM}},
  volume       = {42},
  number       = {7},
  pages        = {38--44},
  year         = {1999},
  url          = {https://doi.org/10.1145/306549.306563},
  doi          = {10.1145/306549.306563},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/GhoshV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/GhoshS99,
  author       = {Anup K. Ghosh and
                  Aaron Schwartzbard},
  editor       = {Vijayalakshmi Atluri and
                  John Hale},
  title        = {Analyzing the Performance of Program Behavior Profiling for Intrusion
                  Detection},
  booktitle    = {Research Advances in Database and Information Systems Security, {IFIP}
                  {WG} 11.3 Thirteenth International Conference on Database Security,
                  July 26-28, 1999, Seattle, Washington, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {171},
  pages        = {19--32},
  publisher    = {Kluwer},
  year         = {1999},
  timestamp    = {Thu, 03 Jan 2002 11:56:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/GhoshS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ftcs/GhoshSH99,
  author       = {Anup K. Ghosh and
                  Matthew Schmid and
                  Frank Hill},
  title        = {Wrapping Windows {NT} Software for Robustness},
  booktitle    = {Digest of Papers: FTCS-29, The Twenty-Ninth Annual International Symposium
                  on Fault-Tolerant Computing, Madison, Wisconsin, USA, June 15-18,
                  1999},
  pages        = {344--347},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/FTCS.1999.781070},
  doi          = {10.1109/FTCS.1999.781070},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ftcs/GhoshSH99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/id/GhoshSS99,
  author       = {Anup K. Ghosh and
                  Aaron Schwartzbard and
                  Michael Schatz},
  title        = {Learning Program Behavior Profiles for Intrusion Detection},
  booktitle    = {Proceedings of the Workshop on Intrusion Detection and Network Monitoring,
                  Santa Clara, CA, USA, April 9-12, 1999},
  pages        = {51--62},
  publisher    = {{USENIX}},
  year         = {1999},
  url          = {http://www.usenix.org/publications/library/proceedings/detection99/ghosh.html},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/id/GhoshSS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/GhoshS99,
  author       = {Anup K. Ghosh and
                  Matthew Schmid},
  title        = {An approach to testing {COTS} software for robustness to operating
                  system exceptions and errors},
  booktitle    = {10th International Symposium on Software Reliability Engineering,
                  ISSRE, 1999, Boca Raton, FL, USA, November 1-4, 1999},
  pages        = {166--174},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/ISSRE.1999.809321},
  doi          = {10.1109/ISSRE.1999.809321},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/GhoshS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SchwartzbardG99,
  author       = {Aaron Schwartzbard and
                  Anup K. Ghosh},
  title        = {A Study in the Feasibility of Performing Host-Based Anomaly Detection
                  on Windows {NT}},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  timestamp    = {Thu, 08 Aug 2019 09:26:07 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SchwartzbardG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GhoshS99,
  author       = {Anup K. Ghosh and
                  Aaron Schwartzbard},
  editor       = {G. Winfield Treese},
  title        = {A Study in Using Neural Networks for Anomaly and Misuse Detection},
  booktitle    = {Proceedings of the 8th {USENIX} Security Symposium, Washington, DC,
                  USA, August 23-26, 1999},
  publisher    = {{USENIX} Association},
  year         = {1999},
  url          = {https://www.usenix.org/conference/8th-usenix-security-symposium/study-using-neural-networks-anomaly-and-misuse-detection},
  timestamp    = {Mon, 01 Feb 2021 08:43:06 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GhoshS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/Ghosh99,
  author       = {Anup K. Ghosh},
  title        = {Certifying E-Commerce Software for Security},
  booktitle    = {Proceedings of the First International Workshop on Advance Issues
                  of E-Commerce and Web-Based Information Systems, Santa Clara, California,
                  USA, April 8-9, 1999},
  pages        = {64--67},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/WECWIS.1999.788187},
  doi          = {10.1109/WECWIS.1999.788187},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wecwis/Ghosh99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GoshWC98,
  author       = {Anup K. Ghosh and
                  James Wanken and
                  Frank Charron},
  title        = {Detecting Anomalous and Unknown Intrusions Against Programs},
  booktitle    = {14th Annual Computer Security Applications Conference {(ACSAC} 1998),
                  7-11 December 1998, Scottsdale, AZ, {USA}},
  pages        = {259--267},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/CSAC.1998.738646},
  doi          = {10.1109/CSAC.1998.738646},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GoshWC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Ghosh98,
  author       = {Anup K. Ghosh},
  editor       = {Sushil Jajodia},
  title        = {E-Commerce Security: No Silver Bullet},
  booktitle    = {Database Security {XII:} Status and Prospects, {IFIP} {TC11} {WG}
                  11.3 Twelfth International Working Conference on Database Security,
                  July 15-17, 1998, Chalkidiki, Greece},
  series       = {{IFIP} Conference Proceedings},
  volume       = {142},
  pages        = {3--16},
  publisher    = {Kluwer},
  year         = {1998},
  timestamp    = {Mon, 21 Oct 2002 13:30:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/Ghosh98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/GhoshSS98,
  author       = {Anup K. Ghosh and
                  Matthew Schmid and
                  V. Shah},
  title        = {Testing the robustness of Windows {NT} software},
  booktitle    = {Ninth International Symposium on Software Reliability Engineering,
                  {ISSRE} 1998, Paderborn, Germany, November 4-7, 1998},
  pages        = {231--235},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ISSRE.1998.730886},
  doi          = {10.1109/ISSRE.1998.730886},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/GhoshSS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/Ghosh98,
  author       = {Anup K. Ghosh},
  title        = {On certifying mobile code for secure applications},
  booktitle    = {Ninth International Symposium on Software Reliability Engineering,
                  {ISSRE} 1998, Paderborn, Germany, November 4-7, 1998},
  pages        = {381},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ISSRE.1998.730905},
  doi          = {10.1109/ISSRE.1998.730905},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/Ghosh98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GhoshOM98,
  author       = {Anup K. Ghosh and
                  Tom O'Connor and
                  Gary McGraw},
  title        = {An Automated Approach for Identifying Potential Vulnerabilities in
                  Software},
  booktitle    = {Security and Privacy - 1998 {IEEE} Symposium on Security and Privacy,
                  Oakland, CA, USA, May 3-6, 1998, Proceedings},
  pages        = {104--114},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/SECPRI.1998.674827},
  doi          = {10.1109/SECPRI.1998.674827},
  timestamp    = {Thu, 21 Sep 2023 15:57:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GhoshOM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/VoasGCK97,
  author       = {Jeffrey M. Voas and
                  Anup K. Ghosh and
                  Frank Charron and
                  Lora Kassab},
  title        = {Reducing uncertainty about common-mode failures},
  booktitle    = {Eighth International Symposium on Software Reliability Engineering,
                  {ISSRE} 1997, Albuquerque, NM, USA, November 2-5, 1997},
  pages        = {308--319},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/ISSRE.1997.630879},
  doi          = {10.1109/ISSRE.1997.630879},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/VoasGCK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics