Year |
Citation |
Score |
2015 |
Duan S, Peisert S, Levitt KN. Hbft: Speculative Byzantine fault tolerance with minimum cost Ieee Transactions On Dependable and Secure Computing. 12: 58-70. DOI: 10.1109/Tdsc.2014.2312331 |
0.535 |
|
2008 |
Cheetancheri SG, Agosta JM, Levitt KN, Wu F, Rowe J. Optimal cost, collaborative, and distributed response to zero-day worms - A control theoretic approach Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5230: 231-250. DOI: 10.1007/978-3-540-87403-4_13 |
0.655 |
|
2007 |
Nguyen LQ, Demir T, Rowe J, Hsu F, Levitt K. A framework for diversifying windows native APIs to tolerate code injection attacks Proceedings of the 2nd Acm Symposium On Information, Computer and Communications Security, Asiaccs '07. 392-394. DOI: 10.1145/1229285.1229338 |
0.655 |
|
2006 |
Cheetancheri SG, Agosta JM, Dash DH, Levitt KN, Rowe J, Schooler EM. A distributed host-based worm detection system Proceedings of the 2006 Sigcomm Workshop On Large-Scale Attack Defense, Lsad'06. 2006: 107-113. DOI: 10.1145/1162666.1162668 |
0.661 |
|
2006 |
Cheetancheri SG, Ma DL, Levitt KN, Heberlein TL. Towards a framework for worm-defense evaluation Conference Proceedings of the Ieee International Performance, Computing, and Communications Conference. 2006: 559-565. DOI: 10.1109/.2006.1629453 |
0.649 |
|
2006 |
Tseng CH, Wang SH, Ko C, Levitt K. DEMEM: Distributed Evidence-driven Message Exchange intrusion detection Model for MANET Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4219: 249-271. |
0.339 |
|
2003 |
Balepin I, Maltsev S, Rowe J, Levitt K. Using specification-based intrusion detection for automated response Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2820: 136-154. |
0.314 |
|
2002 |
Just JE, Reynolds JC, Clough LA, Danforth M, Levitt KN, Maglich R, Rowe J. Learning unknown attacks - A start Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2516: 158-176. DOI: 10.1007/3-540-36084-0_9 |
0.655 |
|
1996 |
Heckman MR, Zhang C, Becker BR, Peticolas D, Levitt KN, Olsson RA. Towards applying the composition principle to verify a microkernel operating system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1125: 235-250. |
0.676 |
|
1995 |
Zhang C, Becker BR, Heckman MR, Levitt K, Olsson RA. A hierarchical method for reasoning about distributed programming languages Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 971: 385-400. DOI: 10.1007/3-540-60275-5_78 |
0.683 |
|
Show low-probability matches. |