Year |
Citation |
Score |
2015 |
Zand A, Houmansadr A, Vigna G, Kemmerer R, Kruegel C. Know your achilles' heel: Automatic detection of network critical services Acm International Conference Proceeding Series. 7: 41-50. DOI: 10.1145/2818000.2818012 |
0.716 |
|
2015 |
Caillat B, Gilbert B, Kemmerer R, Kruegel C, Vigna G. Prison: Tracking process interactions to contain malware Proceedings - 2015 Ieee 17th International Conference On High Performance Computing and Communications, 2015 Ieee 7th International Symposium On Cyberspace Safety and Security and 2015 Ieee 12th International Conference On Embedded Software and Systems, Hpcc-Css-Icess 2015. 1282-1291. DOI: 10.1109/HPCC-CSS-ICESS.2015.297 |
0.695 |
|
2015 |
Vigna G, Kemmerer RA, Blix P. Designing a web of highly-configurable intrusion detection sensors Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2212: 69-84. |
0.548 |
|
2014 |
Iedemska J, Stringhini G, Kemmerer R, Kruegel C, Vigna G. The tricks of the trade: What makes spam campaigns successful? Proceedings - Ieee Symposium On Security and Privacy. 2014: 77-83. DOI: 10.1109/SPW.2014.21 |
0.663 |
|
2014 |
Zand A, Vigna G, Kemmerer R, Kruegel C. Rippler: Delay injection for service dependency detection Proceedings - Ieee Infocom. 2157-2165. DOI: 10.1109/INFOCOM.2014.6848158 |
0.698 |
|
2013 |
Vamvoudakis KG, Hespanha JP, Kemmerer RA, Vigna G. Formulating Cyber-Security as Convex Optimization Problems Lecture Notes in Control and Information Sciences. 449: 85-100. DOI: 10.1007/978-3-319-01159-2_5 |
0.522 |
|
2011 |
Stone-Gross B, Stevens R, Zarras A, Kemmerer R, Kruegel C, Vigna G. Understanding fraudulent activities in online ad exchanges Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 279-294. DOI: 10.1145/2068816.2068843 |
0.607 |
|
2011 |
Stone-Gross B, Cova M, Gilbert B, Kemmerer R, Kruegel C, Vigna G. Analysis of a botnet takeover Ieee Security and Privacy. 9: 64-72. DOI: 10.1109/MSP.2010.144 |
0.673 |
|
2011 |
Weldemariam K, Kemmerer RA, Villafiorita A. Formal analysis of an electronic voting system: An experience report Journal of Systems and Software. 84: 1618-1637. DOI: 10.1016/J.Jss.2011.03.032 |
0.451 |
|
2011 |
Gilbert B, Kemmerer R, Kruegel C, Vigna G. DYMO: Tracking dynamic code identity Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6961: 21-40. DOI: 10.1007/978-3-642-23644-0_2 |
0.672 |
|
2011 |
Banks G, Fattori A, Kemmerer R, Kruegel C, Vigna G. MISHIMA: Multilateration of internet hosts hidden using malicious fast-flux agents (short paper) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6739: 184-193. DOI: 10.1007/978-3-642-22424-9_11 |
0.637 |
|
2010 |
Balzarotti D, Banks G, Cova M, Felmetsger V, Kemmerer R, Robertson W, Valeur F, Vigna G. An experience in testing the security of real-world electronic voting systems Ieee Transactions On Software Engineering. 36: 453-473. DOI: 10.1109/Tse.2009.53 |
0.776 |
|
2010 |
Weldemariam K, Kemmerer RA, Villafiorita A. Formal specification and analysis of an e-voting system Ares 2010 - 5th International Conference On Availability, Reliability, and Security. 164-171. DOI: 10.1109/ARES.2010.83 |
0.321 |
|
2009 |
Stone-Gross B, Cova M, Cavallaro L, Gilbert B, Szydlowski M, Kemmerer R, Kruegel C, Vigna G. Your botnet is my botnet: Analysis of a botnet takeover Proceedings of the Acm Conference On Computer and Communications Security. 635-647. DOI: 10.1145/1653662.1653738 |
0.632 |
|
2009 |
Weldemariam K, Kemmerer RA, Villafiorita A. Formal analysis of attacks for e-voting system Post-Proceedings of the 4th International Conference On Risks and Security of Internet and Systems, Crisis 2009. 26-34. DOI: 10.1109/CRISIS.2009.5411982 |
0.332 |
|
2009 |
Carle G, Dressler F, Kemmerer RA, Koenig H, Kruegel C, Laskov P. Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008 Computer Science - Research and Development. 23: 15-25. DOI: 10.1007/S00450-009-0055-Y |
0.67 |
|
2008 |
Balzarotti D, Banks G, Cova M, Felmetsger V, Kemmerer R, Robertson W, Valeur F, Vigna G. Are your votes really counted? Testing the security of real-world electronic voting systems Issta'08: Proceedings of the 2008 International Symposium On Software Testing and Analysis 2008. 237-247. DOI: 10.1145/1390630.1390660 |
0.772 |
|
2007 |
Årnes A, Haas P, Vigna G, Kemmerer RA. Using a virtual security testbed for digital forensic reconstruction Journal in Computer Virology. 2: 275-289. DOI: 10.1007/S11416-006-0033-X |
0.599 |
|
2007 |
Mutz D, Robertson W, Vigna G, Kemmerer R. Exploiting execution context for the detection of anomalous system calls Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4637: 1-20. |
0.577 |
|
2006 |
Årnes A, Valeur F, Vigna G, Kemmerer RA. Using hidden Markov models to evaluate the risks of intrusions system architecture and model validation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4219: 145-164. |
0.782 |
|
2006 |
Banks G, Cova M, Felmetsger V, Almeroth K, Kemmerer R, Vigna G. SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4176: 343-358. |
0.619 |
|
2006 |
Årnes A, Haas P, Vigna G, Kemmerer RA. Digital forensic reconstruction and the virtual security testbed ViSe Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4064: 144-163. |
0.556 |
|
2005 |
Kemmerer RA, Vigna G. Hi-DRA: Intrusion detection for Internet security Proceedings of the Ieee. 93: 1848-1857. DOI: 10.1109/JPROC.2005.853547 |
0.624 |
|
2004 |
Valeur F, Vigna G, Kruegel C, Kemmerer RA. A comprehensive approach to intrusion detection alert correlation Ieee Transactions On Dependable and Secure Computing. 1: 146-168. DOI: 10.1109/Tdsc.2004.21 |
0.765 |
|
2004 |
Vigna G, Gwalani S, Srinivasan K, Belding-Royer EM, Kemmerer RA. An intrusion detection tool for AODV-based ad hoc wireless networks Proceedings - Annual Computer Security Applications Conference, Acsac. 16-27. |
0.605 |
|
2003 |
Vigna G, Valeur F, Kemmerer RA. Designing and implementing a family of intrusion detection systems Proceedings of the Acm Sigsoft Symposium On the Foundations of Software Engineering. 88-97. DOI: 10.1145/940071.940084 |
0.801 |
|
2003 |
Mutz D, Vigna G, Kemmerer R. An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems Proceedings - Annual Computer Security Applications Conference, Acsac. 2003: 374-383. DOI: 10.1109/CSAC.2003.1254342 |
0.563 |
|
2003 |
Vigna G, Robertson W, Kher V, Kemmerer RA. A stateful intrusion detection system for World-Wide Web servers Proceedings - Annual Computer Security Applications Conference, Acsac. 2003: 34-43. DOI: 10.1109/CSAC.2003.1254308 |
0.618 |
|
2003 |
Kemmerer RA, Vigna G. Internet security and intrusion detection Proceedings - International Conference On Software Engineering. 748-749. |
0.582 |
|
2003 |
Kemmerer RA. Cybersecurity Proceedings - International Conference On Software Engineering. 705-715. |
0.36 |
|
2002 |
Eckmann ST, Vigna G, Kemmerer RA. STATL: An attack language for state-based intrusion detection Journal of Computer Security. 10: 71-103. DOI: 10.3233/Jcs-2002-101-204 |
0.772 |
|
2002 |
Kruegel C, Valeur F, Vigna G, Kemmerer R. Stateful intrusion detection for high-speed network's Proceedings - Ieee Symposium On Security and Privacy. 2002: 285-293. DOI: 10.1109/SECPRI.2002.1004378 |
0.792 |
|
2002 |
Kemmerer RA, Vigna G. Intrusion detection: A brief history and overview Computer. 35: 27-30. DOI: 10.1109/Mc.2002.1012428 |
0.592 |
|
2002 |
Vigna G, Valeur F, Zhou J, Kemmerer RA. Composable tools for network discovery and security analysis Proceedings - Annual Computer Security Applications Conference, Acsac. 2002: 14-24. DOI: 10.1109/CSAC.2002.1176274 |
0.792 |
|
2002 |
Kruegel C, Valeur F, Vigna G, Kemmerer R. Stateful intrusion detection for high-speed networks Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 285-293. |
0.792 |
|
2001 |
Fischmeister S, Vigna G, Kemmerer RA. Evaluating the security of three java-based mobile agent systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2240: 31-41. DOI: 10.1007/3-540-45647-3_3 |
0.611 |
|
2000 |
Vigna G, Eckmann ST, Kemmerer RA. The STAT tool suite Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2000. 2: 46-55. DOI: 10.1109/DISCEX.2000.821508 |
0.726 |
|
1999 |
Vigna G, Kemmerer RA. NetSTAT: a network-based intrusion detection system Journal of Computer Security. 7: 37-71. DOI: 10.3233/Jcs-1999-7103 |
0.649 |
|
1999 |
Kolano PZ, Dang Z, Kemmerer RA. The design and analysis of real-time systems using the ASTRAL software development environment Annals of Software Engineering. 7: 177-210. DOI: 10.1023/A:1018934104631 |
0.407 |
|
1997 |
Coen-Porisini A, Ghezzi C, Kemmerer RA. Specification of realtime systems using ASTRAL Ieee Transactions On Software Engineering. 23: 572-598. DOI: 10.1109/32.629494 |
0.383 |
|
1995 |
Ilgun K, Kemmerer RA, Porras PA. State Transition Analysis: A Rule-Based Intrusion Detection Approach Ieee Transactions On Software Engineering. 21: 181-199. DOI: 10.1109/32.372146 |
0.373 |
|
1992 |
Reichbach JD, Kemmerer RA. Soundworks: An Object-Oriented Distributed System for Digital Sound Computer. 25: 25-37. DOI: 10.1109/2.121506 |
0.309 |
|
1985 |
Eckmann ST, Kemmerer RA. INATEST: an interactive environment for testing formal specifications Acm Sigsoft Software Engineering Notes. 10: 17-18. DOI: 10.1145/1012497.1012504 |
0.735 |
|
1985 |
Kemmerer RA, Eckmann ST. UNISEX: A UNIX-BASED SYMBOLIC EXECUTOR FOR PASCAL Software - Practice and Experience. 15: 439-458. DOI: 10.1002/Spe.4380150504 |
0.753 |
|
1980 |
Wlker BJ, Kemmerer RA, Popek GJ. SPECIFICATION AND VERIFICATION OF UCLA UNIX SECURITY KERNEL Communications of the Acm. 23: 118-131. DOI: 10.1145/358818.358825 |
0.714 |
|
Show low-probability matches. |