Richard A. Kemmerer - Publications

Affiliations: 
Computer Science University of California, Santa Barbara, Santa Barbara, CA, United States 

45 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2015 Zand A, Houmansadr A, Vigna G, Kemmerer R, Kruegel C. Know your achilles' heel: Automatic detection of network critical services Acm International Conference Proceeding Series. 7: 41-50. DOI: 10.1145/2818000.2818012  0.716
2015 Caillat B, Gilbert B, Kemmerer R, Kruegel C, Vigna G. Prison: Tracking process interactions to contain malware Proceedings - 2015 Ieee 17th International Conference On High Performance Computing and Communications, 2015 Ieee 7th International Symposium On Cyberspace Safety and Security and 2015 Ieee 12th International Conference On Embedded Software and Systems, Hpcc-Css-Icess 2015. 1282-1291. DOI: 10.1109/HPCC-CSS-ICESS.2015.297  0.695
2015 Vigna G, Kemmerer RA, Blix P. Designing a web of highly-configurable intrusion detection sensors Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2212: 69-84.  0.548
2014 Iedemska J, Stringhini G, Kemmerer R, Kruegel C, Vigna G. The tricks of the trade: What makes spam campaigns successful? Proceedings - Ieee Symposium On Security and Privacy. 2014: 77-83. DOI: 10.1109/SPW.2014.21  0.663
2014 Zand A, Vigna G, Kemmerer R, Kruegel C. Rippler: Delay injection for service dependency detection Proceedings - Ieee Infocom. 2157-2165. DOI: 10.1109/INFOCOM.2014.6848158  0.698
2013 Vamvoudakis KG, Hespanha JP, Kemmerer RA, Vigna G. Formulating Cyber-Security as Convex Optimization Problems Lecture Notes in Control and Information Sciences. 449: 85-100. DOI: 10.1007/978-3-319-01159-2_5  0.522
2011 Stone-Gross B, Stevens R, Zarras A, Kemmerer R, Kruegel C, Vigna G. Understanding fraudulent activities in online ad exchanges Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 279-294. DOI: 10.1145/2068816.2068843  0.607
2011 Stone-Gross B, Cova M, Gilbert B, Kemmerer R, Kruegel C, Vigna G. Analysis of a botnet takeover Ieee Security and Privacy. 9: 64-72. DOI: 10.1109/MSP.2010.144  0.673
2011 Weldemariam K, Kemmerer RA, Villafiorita A. Formal analysis of an electronic voting system: An experience report Journal of Systems and Software. 84: 1618-1637. DOI: 10.1016/J.Jss.2011.03.032  0.451
2011 Gilbert B, Kemmerer R, Kruegel C, Vigna G. DYMO: Tracking dynamic code identity Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6961: 21-40. DOI: 10.1007/978-3-642-23644-0_2  0.672
2011 Banks G, Fattori A, Kemmerer R, Kruegel C, Vigna G. MISHIMA: Multilateration of internet hosts hidden using malicious fast-flux agents (short paper) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6739: 184-193. DOI: 10.1007/978-3-642-22424-9_11  0.637
2010 Balzarotti D, Banks G, Cova M, Felmetsger V, Kemmerer R, Robertson W, Valeur F, Vigna G. An experience in testing the security of real-world electronic voting systems Ieee Transactions On Software Engineering. 36: 453-473. DOI: 10.1109/Tse.2009.53  0.776
2010 Weldemariam K, Kemmerer RA, Villafiorita A. Formal specification and analysis of an e-voting system Ares 2010 - 5th International Conference On Availability, Reliability, and Security. 164-171. DOI: 10.1109/ARES.2010.83  0.321
2009 Stone-Gross B, Cova M, Cavallaro L, Gilbert B, Szydlowski M, Kemmerer R, Kruegel C, Vigna G. Your botnet is my botnet: Analysis of a botnet takeover Proceedings of the Acm Conference On Computer and Communications Security. 635-647. DOI: 10.1145/1653662.1653738  0.632
2009 Weldemariam K, Kemmerer RA, Villafiorita A. Formal analysis of attacks for e-voting system Post-Proceedings of the 4th International Conference On Risks and Security of Internet and Systems, Crisis 2009. 26-34. DOI: 10.1109/CRISIS.2009.5411982  0.332
2009 Carle G, Dressler F, Kemmerer RA, Koenig H, Kruegel C, Laskov P. Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008 Computer Science - Research and Development. 23: 15-25. DOI: 10.1007/S00450-009-0055-Y  0.67
2008 Balzarotti D, Banks G, Cova M, Felmetsger V, Kemmerer R, Robertson W, Valeur F, Vigna G. Are your votes really counted? Testing the security of real-world electronic voting systems Issta'08: Proceedings of the 2008 International Symposium On Software Testing and Analysis 2008. 237-247. DOI: 10.1145/1390630.1390660  0.772
2007 Årnes A, Haas P, Vigna G, Kemmerer RA. Using a virtual security testbed for digital forensic reconstruction Journal in Computer Virology. 2: 275-289. DOI: 10.1007/S11416-006-0033-X  0.599
2007 Mutz D, Robertson W, Vigna G, Kemmerer R. Exploiting execution context for the detection of anomalous system calls Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4637: 1-20.  0.577
2006 Årnes A, Valeur F, Vigna G, Kemmerer RA. Using hidden Markov models to evaluate the risks of intrusions system architecture and model validation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4219: 145-164.  0.782
2006 Banks G, Cova M, Felmetsger V, Almeroth K, Kemmerer R, Vigna G. SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4176: 343-358.  0.619
2006 Årnes A, Haas P, Vigna G, Kemmerer RA. Digital forensic reconstruction and the virtual security testbed ViSe Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4064: 144-163.  0.556
2005 Kemmerer RA, Vigna G. Hi-DRA: Intrusion detection for Internet security Proceedings of the Ieee. 93: 1848-1857. DOI: 10.1109/JPROC.2005.853547  0.624
2004 Valeur F, Vigna G, Kruegel C, Kemmerer RA. A comprehensive approach to intrusion detection alert correlation Ieee Transactions On Dependable and Secure Computing. 1: 146-168. DOI: 10.1109/Tdsc.2004.21  0.765
2004 Vigna G, Gwalani S, Srinivasan K, Belding-Royer EM, Kemmerer RA. An intrusion detection tool for AODV-based ad hoc wireless networks Proceedings - Annual Computer Security Applications Conference, Acsac. 16-27.  0.605
2003 Vigna G, Valeur F, Kemmerer RA. Designing and implementing a family of intrusion detection systems Proceedings of the Acm Sigsoft Symposium On the Foundations of Software Engineering. 88-97. DOI: 10.1145/940071.940084  0.801
2003 Mutz D, Vigna G, Kemmerer R. An experience developing an IDS stimulator for the black-box testing of network intrusion detection systems Proceedings - Annual Computer Security Applications Conference, Acsac. 2003: 374-383. DOI: 10.1109/CSAC.2003.1254342  0.563
2003 Vigna G, Robertson W, Kher V, Kemmerer RA. A stateful intrusion detection system for World-Wide Web servers Proceedings - Annual Computer Security Applications Conference, Acsac. 2003: 34-43. DOI: 10.1109/CSAC.2003.1254308  0.618
2003 Kemmerer RA, Vigna G. Internet security and intrusion detection Proceedings - International Conference On Software Engineering. 748-749.  0.582
2003 Kemmerer RA. Cybersecurity Proceedings - International Conference On Software Engineering. 705-715.  0.36
2002 Eckmann ST, Vigna G, Kemmerer RA. STATL: An attack language for state-based intrusion detection Journal of Computer Security. 10: 71-103. DOI: 10.3233/Jcs-2002-101-204  0.772
2002 Kruegel C, Valeur F, Vigna G, Kemmerer R. Stateful intrusion detection for high-speed network's Proceedings - Ieee Symposium On Security and Privacy. 2002: 285-293. DOI: 10.1109/SECPRI.2002.1004378  0.792
2002 Kemmerer RA, Vigna G. Intrusion detection: A brief history and overview Computer. 35: 27-30. DOI: 10.1109/Mc.2002.1012428  0.592
2002 Vigna G, Valeur F, Zhou J, Kemmerer RA. Composable tools for network discovery and security analysis Proceedings - Annual Computer Security Applications Conference, Acsac. 2002: 14-24. DOI: 10.1109/CSAC.2002.1176274  0.792
2002 Kruegel C, Valeur F, Vigna G, Kemmerer R. Stateful intrusion detection for high-speed networks Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 285-293.  0.792
2001 Fischmeister S, Vigna G, Kemmerer RA. Evaluating the security of three java-based mobile agent systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2240: 31-41. DOI: 10.1007/3-540-45647-3_3  0.611
2000 Vigna G, Eckmann ST, Kemmerer RA. The STAT tool suite Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2000. 2: 46-55. DOI: 10.1109/DISCEX.2000.821508  0.726
1999 Vigna G, Kemmerer RA. NetSTAT: a network-based intrusion detection system Journal of Computer Security. 7: 37-71. DOI: 10.3233/Jcs-1999-7103  0.649
1999 Kolano PZ, Dang Z, Kemmerer RA. The design and analysis of real-time systems using the ASTRAL software development environment Annals of Software Engineering. 7: 177-210. DOI: 10.1023/A:1018934104631  0.407
1997 Coen-Porisini A, Ghezzi C, Kemmerer RA. Specification of realtime systems using ASTRAL Ieee Transactions On Software Engineering. 23: 572-598. DOI: 10.1109/32.629494  0.383
1995 Ilgun K, Kemmerer RA, Porras PA. State Transition Analysis: A Rule-Based Intrusion Detection Approach Ieee Transactions On Software Engineering. 21: 181-199. DOI: 10.1109/32.372146  0.373
1992 Reichbach JD, Kemmerer RA. Soundworks: An Object-Oriented Distributed System for Digital Sound Computer. 25: 25-37. DOI: 10.1109/2.121506  0.309
1985 Eckmann ST, Kemmerer RA. INATEST: an interactive environment for testing formal specifications Acm Sigsoft Software Engineering Notes. 10: 17-18. DOI: 10.1145/1012497.1012504  0.735
1985 Kemmerer RA, Eckmann ST. UNISEX: A UNIX-BASED SYMBOLIC EXECUTOR FOR PASCAL Software - Practice and Experience. 15: 439-458. DOI: 10.1002/Spe.4380150504  0.753
1980 Wlker BJ, Kemmerer RA, Popek GJ. SPECIFICATION AND VERIFICATION OF UCLA UNIX SECURITY KERNEL Communications of the Acm. 23: 118-131. DOI: 10.1145/358818.358825  0.714
Show low-probability matches.