John McHugh

According to our database1, John McHugh authored at least 52 papers between 1985 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Virtual Career Advisor System.
Proceedings of the Mobile Web and Intelligent Information Systems, 2023

2017
Humans Are Dynamic - Our Tools Should Be Too.
IEEE Internet Comput., 2017

2016
Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

2015
A Human Capital Model for Mitigating Security Analyst Burnout.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

2014
An Anthropological Approach to Studying CSIRTs.
IEEE Secur. Priv., 2014

2013
Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
Toward Efficient Querying of Compressed Network Payloads.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

2011
Moving Forward, Building an Ethics Community (Panel Statements).
Proceedings of the Financial Cryptography and Data Security, 2011

Verified workflow-based software development for infrastructure sensing and control applications.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Traffic classification using visual motifs: an empirical evaluation.
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010

Why is there no science in cyber science?: a panel discussion at NSPW 2010.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

Cuckoo bags for exploring multikey data.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Progressive Internal Waves of Permanent Form.
SIAM J. Appl. Math., 2009

Over flow: An overview visualization for network analysis.
Proceedings of the 6th International Workshop on Visualization for Cyber Security, 2009

DOE grass roots panel.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Long term data storage issues for situational awareness.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

2008
Sybil attacks as a mitigation strategy against the Storm botnet.
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008

Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?.
Proceedings of the Computer Security, 2008

The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors.
Proceedings of the Detection of Intrusions and Malware, 2008

2007
NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior.
Proceedings of the 4th International Workshop on Visualization for Computer Security, 2007

Queue Management as a DoS Counter-Measure?
Proceedings of the Information Security, 10th International Conference, 2007

Implementing and testing dynamic timeout adjustment as a dos counter-measure.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

2006
Quality of protection: measuring the unmeasurable?
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006

2005
Software diversity: <i>use of diversity as a defense mechanism</i>.
Proceedings of the New Security Paradigms Workshop 2005, 2005

2004
Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data.
Proceedings of the Computer Security, 2004

2003
Locality: a new paradigm for thinking about normal behavior and outsider threat.
Proceedings of the New Security Paradigms Workshop 2003, 2003

2002
Hiding Intrusions: From the Abnormal to the Normal and Beyond.
Proceedings of the Information Hiding, 5th International Workshop, 2002

2001
Intrusion and intrusion detection.
Int. J. Inf. Sec., 2001

Managing Software Development for Survivable Systems.
Ann. Softw. Eng., 2001

A Trend Analysis of Exploitations.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

An Information Flow Tool for Gypsy.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory.
ACM Trans. Inf. Syst. Secur., 2000

Defending Yourself: The Role of Intrusion Detection Systems.
IEEE Softw., 2000

Windows of Vulnerability: A Case Study Analysis.
Computer, 2000

The 1998 Lincoln Laboratory IDS Evaluation.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000

1999
Secure group management in large distributed systems: what is a group and what does it do?
Proceedings of the 1999 Workshop on New Security Paradigms, 1999

Chaffing at the Bit: Thoughts on a Note by Ronald Rivest.
Proceedings of the Information Hiding, Third International Workshop, 1999

1996
Guest Editorial: Introduction to the Special Section.
IEEE Trans. Software Eng., 1996

1993
A High Assurance Window System Prototype.
J. Comput. Secur., 1993

1992
Evolution of a trusted B3 window system prototype.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

Ada 9X and Safety Critical/Secure Systems.
Proceedings of the Conference Proceedings on TRI-Ada 1992, 1992

A cautionary note on image downgrading.
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992

Heuristic authentication protocol for TCP/IP network applications under UNIX.
Proceedings of the 30th Annual Southeast Regional Conference, 1992

1991
A prototype B3 trusted X Window System.
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991

1989
A risk driven process model for the development of trusted systems.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989

1988
Multilevel security issues in distributed database management systems.
Comput. Secur., 1988

A Formal Definition for Information Flow in the Gypsy Expression Language.
Proceedings of the First IEEE Computer Security Foundations Workshop, 1988

1987
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
IEEE Trans. Software Eng., 1987

Coding for a Believable Specification to Implementation Mapping.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

1986
A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area Network.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986

1985
Ada verification using existing tools.
ACM SIGSOFT Softw. Eng. Notes, 1985

An Information Flow Tool for Gypsy.
Proceedings of the 1985 IEEE Symposium on Security and Privacy, 1985


  Loading...