Anup K. Ghosh

According to our database1, Anup K. Ghosh authored at least 38 papers between 1997 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Lost Decade or Golden Era: Computer Security since 9/11.
IEEE Secur. Priv., 2012

2011
Introducing Diversity and Uncertainty to Create Moving Attack Surfaces for Web Services.
Proceedings of the Moving Target Defense, 2011

The ephemeral legion: producing an expert cyber-security work force from thin air.
Commun. ACM, 2011

Trading Elephants for Ants: Efficient Post-attack Reconstitution.
Proceedings of the Security and Privacy in Communication Networks, 2011

The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security.
Proceedings of the First SysSec Workshop 2011, 2011

2010
HyperCheck: A Hardware-Assisted Integrity Monitor.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

A Virtualization Architecture for In-Depth Kernel Isolation.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

SafeFox: A Safe Lightweight Virtual Browsing Environment.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

A security evaluation of a novel resilient web serving architecture: Lessons learned through industry/academia collaboration.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2010), Chicago, Illinois, USA, June 28, 2010

2009
Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

2008
TCP throughput enhancement in wired-cum-wireless network.
Comput. Commun., 2008

Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites.
Proceedings of the Collaborative Computing: Networking, 2008

Efficiently tracking application interactions using lightweight virtualization.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008

2007
Software Protection through Anti-Debugging.
IEEE Secur. Priv., 2007

Sender Side Intelligence for TCP Throughput Enhancement in Wired-Cum-Wireless Network.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

2002
Simple, state-based approaches to program-based anomaly detection.
ACM Trans. Inf. Syst. Secur., 2002

Building Software Securely from the Ground Up.
IEEE Softw., 2002

Protecting Data from Malicious Software.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
New Security Issues in Mobile E-Commerce.
Proceedings of the E-Commerce Security and Privacy, 2001

Software security and privacy risks in mobile e-commerce.
Commun. ACM, 2001

How Useful is Software Fault Injection for Evaluating the Security of COTS Products?
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000

A Real-Time Intrusion Detection System Based on Learning Program Behavior.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000

Two State-based Approaches to Program-based Anomaly Detection.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
Inoculating Software for Survivability.
Commun. ACM, 1999

Certifying E-Commerce Software for Security.
Proceedings of the First International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems, 1999

A Study in Using Neural Networks for Anomaly and Misuse Detection.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999

A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999

An approach to testing COTS software for robustness to operating system exceptions and errors.
Proceedings of the 10th International Symposium on Software Reliability Engineering, 1999

Learning Program Behavior Profiles for Intrusion Detection.
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, 1999

Wrapping Windows NT Software for Robustness.
Proceedings of the Digest of Papers: FTCS-29, 1999

Analyzing the Performance of Program Behavior Profiling for Intrusion Detection.
Proceedings of the Research Advances in Database and Information Systems Security, 1999

1998
An Automated Approach for Identifying Potential Vulnerabilities in Software.
Proceedings of the Security and Privacy, 1998

Testing the robustness of Windows NT software.
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998

On certifying mobile code for secure applications.
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998

E-Commerce Security: No Silver Bullet.
Proceedings of the Database Security XII: Status and Prospects, 1998

Detecting Anomalous and Unknown Intrusions Against Programs.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1997
Reducing uncertainty about common-mode failures.
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997


  Loading...