Karl Levitt - Publications

Affiliations: 
University of California, Davis, Davis, CA 
Area:
Computer Science

10 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2015 Duan S, Peisert S, Levitt KN. Hbft: Speculative Byzantine fault tolerance with minimum cost Ieee Transactions On Dependable and Secure Computing. 12: 58-70. DOI: 10.1109/Tdsc.2014.2312331  0.535
2008 Cheetancheri SG, Agosta JM, Levitt KN, Wu F, Rowe J. Optimal cost, collaborative, and distributed response to zero-day worms - A control theoretic approach Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5230: 231-250. DOI: 10.1007/978-3-540-87403-4_13  0.655
2007 Nguyen LQ, Demir T, Rowe J, Hsu F, Levitt K. A framework for diversifying windows native APIs to tolerate code injection attacks Proceedings of the 2nd Acm Symposium On Information, Computer and Communications Security, Asiaccs '07. 392-394. DOI: 10.1145/1229285.1229338  0.655
2006 Cheetancheri SG, Agosta JM, Dash DH, Levitt KN, Rowe J, Schooler EM. A distributed host-based worm detection system Proceedings of the 2006 Sigcomm Workshop On Large-Scale Attack Defense, Lsad'06. 2006: 107-113. DOI: 10.1145/1162666.1162668  0.661
2006 Cheetancheri SG, Ma DL, Levitt KN, Heberlein TL. Towards a framework for worm-defense evaluation Conference Proceedings of the Ieee International Performance, Computing, and Communications Conference. 2006: 559-565. DOI: 10.1109/.2006.1629453  0.649
2006 Tseng CH, Wang SH, Ko C, Levitt K. DEMEM: Distributed Evidence-driven Message Exchange intrusion detection Model for MANET Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4219: 249-271.  0.339
2003 Balepin I, Maltsev S, Rowe J, Levitt K. Using specification-based intrusion detection for automated response Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2820: 136-154.  0.314
2002 Just JE, Reynolds JC, Clough LA, Danforth M, Levitt KN, Maglich R, Rowe J. Learning unknown attacks - A start Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2516: 158-176. DOI: 10.1007/3-540-36084-0_9  0.655
1996 Heckman MR, Zhang C, Becker BR, Peticolas D, Levitt KN, Olsson RA. Towards applying the composition principle to verify a microkernel operating system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1125: 235-250.  0.676
1995 Zhang C, Becker BR, Heckman MR, Levitt K, Olsson RA. A hierarchical method for reasoning about distributed programming languages Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 971: 385-400. DOI: 10.1007/3-540-60275-5_78  0.683
Show low-probability matches.