Calvin Ko

According to our database1, Calvin Ko authored at least 20 papers between 1993 and 2010.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Tools for worm experimentation on the DETER testbed.
Int. J. Commun. Networks Distributed Syst., 2010

2007
SEER: A Security Experimentation EnviRonment for DETER.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

2006
DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

Measuring denial Of service.
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006

2005
A Specification-Based Intrusion Detection Model for OLSR.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

A General Cooperative Intrusion Detection Architecture for MANETs.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005

Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005

2004
Formal Reasoning About Intrusion Detection Systems.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

2003
A specification-based intrusion detection system for AODV.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

Challenges in Intrusion Detection for Wireless Ad-hoc Networks.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003

System Health and Intrusion Monitoring (SHIM): Project Summary.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

System Health and Intrusion Monitoring: Technology Description.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
Noninterference and Intrusion Detection.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Detecting and Defending against Web-Server Fingerprinting.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
System Health and Intrusion Monitoring Using a Hierarchy of Constraints.
Proceedings of the Recent Advances in Intrusion Detection, 4th International Symposium, 2001

2000
Detecting and Countering System Intrusions Using Software Wrappers.
Proceedings of the 9th USENIX Security Symposium, 2000

Logic Induction of Valid Behavior Specifications for Intrusion Detection.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

1997
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

1994
Automated detection of vulnerabilities in privileged programs by execution monitoring.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

1993
Analysis of an Algorithm for Distributed Recognition and Accountability.
Proceedings of the CCS '93, 1993


  Loading...