Karl N. Levitt

Orcid: 0000-0002-1464-2966

Affiliations:
  • University of California, Davis, USA


According to our database1, Karl N. Levitt authored at least 125 papers between 1967 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles.
CoRR, 2022

Autonomous Vehicle Security: Composing Attack, Defense, and Policy Surfaces.
Proceedings of the 2022 New Security Paradigms Workshop, 2022

2018
Augmenting Machine Learning with Argumentation.
Proceedings of the New Security Paradigms Workshop, 2018

2016
Firewall configuration: An application of multiagent metalevel argumentation.
Argument Comput., 2016

Is Anybody Home? Inferring Activity From Smart Home Network Traffic.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Cost sensitive moving target consensus.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

Mapping sample scenarios to operational models.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Security and Privacy for Emerging Smart Community Infrastructures.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

Privacy-preserving coordination for smart communities.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Automated cross layer feature selection for effective intrusion detection in networked systems.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
hBFT: Speculative Byzantine Fault Tolerance with Minimum Cost.
IEEE Trans. Dependable Secur. Comput., 2015

Generation bidding game with potentially false attestation of flexible demand.
EURASIP J. Adv. Signal Process., 2015

Security vulnerabilities of connected vehicle streams and their impact on cooperative driving.
IEEE Commun. Mag., 2015

A diagnosis based intrusion detection approach.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Detection of stealthy TCP-based DoS attacks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Cyber reasoning with argumentation: Abstracting from incomplete and contradictory evidence.
Proceedings of the 34th IEEE Military Communications Conference, 2015

2014
Generation bidding game with flexible demand.
CoRR, 2014

Scalable and Anonymous Modeling of Large Populations of Flexible Appliances.
CoRR, 2014

Argument schemes for reasoning about trust.
Argument Comput., 2014

ByzID: Byzantine Fault Tolerance from Intrusion Detection.
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014

A Bidding Game for Generators in the Presence of Flexible Demand.
Proceedings of the 9th International Workshop on Feedback Computing, 2014

2013
Towards the realization of a public health system for shared secure cyber-space.
Proceedings of the New Security Paradigms Workshop, 2013

An Argumentation-Based Approach to Handling Trust in Distributed Decision Making.
Proceedings of the Trust and Autonomous Systems, 2013

2012
Argumentation logic to assist in security administration.
Proceedings of the New Security Paradigms Workshop, 2012

Argument Schemes for Reasoning about Trust.
Proceedings of the Computational Models of Argument, 2012

Arguing About Firewall Policy.
Proceedings of the Computational Models of Argument, 2012

2011
Design and Implementation of FAITH, An Experimental System to Intercept and Manipulate Online Social Informatics.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

2008
A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Using Soft-Line Recursive Response to Improve Query Aggregation in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008

2007
Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

Trusted Hardware: Can It Be Trustworthy?
Proceedings of the 44th Design Automation Conference, 2007

DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

A framework for diversifying windows native APIs to tolerate code injection attacks.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Some Problems in Sanitizing Network Data.
Proceedings of the 15th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2006), 2006

A distributed host-based worm detection system.
Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, 2006

DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006

Sanitization models and their limitations.
Proceedings of the New Security Paradigms Workshop 2006, 2006

Towards a framework for worm-defense evaluation.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006

2005
A Specification-Based Intrusion Detection Model for OLSR.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

A General Cooperative Intrusion Detection Architecture for MANETs.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005

A Network-Based Response Framework and Implementation.
Proceedings of the Active and Programmable Networks, 2005

Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005

2004
Cyber defense technology networking and evaluation.
Commun. ACM, 2004

A hybrid quarantine defense.
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004

How to Sanitize Data.
Proceedings of the 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), 2004

Formal Reasoning About Intrusion Detection Systems.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

2003
A specification-based intrusion detection system for AODV.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller.
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003

Using Specification-Based Intrusion Detection for Automated Response.
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003

Immune System Model for Detecting Web Server Attacks.
Proceedings of the 2003 International Conference on Machine Learning and Applications, 2003

Cooperative Response Strategies for Large Scale Attack Mitigation.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

System Health and Intrusion Monitoring (SHIM): Project Summary.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Automated Analysis for Digital Forensic Science: Semantic Integrity Checking.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Learning Unknown Attacks - A Start.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002

The Design and Implementation of an Intrusion Tolerant System.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

Intrusion Detection: Current Capabilities and Future Directions.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

Detecting and Defending against Web-Server Fingerprinting.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
System Health and Intrusion Monitoring Using a Hierarchy of Constraints.
Proceedings of the Recent Advances in Intrusion Detection, 4th International Symposium, 2001

2000
Intrusion detection inter-component adaptive negotiation.
Comput. Networks, 2000

A Formal-Specification Based Approach for Protecting the Domain Name System.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

Discovery of Multi-Level Security Policies.
Proceedings of the Data and Application Security, 2000

1999
Formal Verification of a Programming Logic for a Distributed Programming Language.
Theor. Comput. Sci., 1999

LVT: A Layered Verification Technique for Distributed Computing Systems.
Softw. Test. Verification Reliab., 1999

DEMIDS: A Misuse Detection System for Database Systems.
Proceedings of the Integrity and Internal Control in Information Systems, 1999

Misuse Detection in Database Systems Through User Profiling.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999

1998
Security Policy Specification Using a Graphical Approach
CoRR, 1998

Applying the Composition Principle to Verify a Hierarchy of Security Servers.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

The Design and Implementation of a Data Level Database Inference Detection System.
Proceedings of the Database Security XII: Status and Prospects, 1998

Data Level Inference Detection in Database Systems.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

1997
Validation of Array Accesses: Integration of Flow Analysis and Program Verification Techniques.
Softw. Test. Verification Reliab., 1997

Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

Protecting routing infrastructures from denial of service using cooperative intrusion detection.
Proceedings of the 1997 Workshop on New Security Paradigms, 1997

Verification of a Distributed Computing.
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997

1996
NetKuang - A Multi-Host Configuration Vulnerability Checker.
Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996, 1996

Towards Applying the Composition Principle to Verify a Microkernel Operating System.
Proceedings of the Theorem Proving in Higher Order Logics, 9th International Conference, 1996

1995
MCF: a malicious code filter.
Comput. Secur., 1995

A Hierarchical Method for Reasoning about Distributed Programming Languages.
Proceedings of the Higher Order Logic Theorem Proving and Its Applications, 1995

1994
Network intrusion detection.
IEEE Netw., 1994

Automated detection of vulnerabilities in privileged programs by execution monitoring.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

Property-based testing of privileged programs.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

1993
Mechanizing a Programming Logic for the Concurrent Programming Language microSR in HOL.
Proceedings of the Higher Order Logic Theorem Proving and its Applications, 1993

Report on the UCD Microcoded Viper Verification Project.
Proceedings of the Higher Order Logic Theorem Proving and its Applications, 1993

Analysis of an Algorithm for Distributed Recognition and Accountability.
Proceedings of the CCS '93, 1993

1992
Towards a Formal Verification of a Floating Point Coprocessor and its Composition with a Central Processing Unit.
Proceedings of the Higher Order Logic Theorem Proving and its Applications, 1992

Implementation and Use of Annotations in HOL.
Proceedings of the Higher Order Logic Theorem Proving and its Applications, 1992

A HOL Mechanisation of the Axiomatic Semantics of a Simple Distributed Programming Language.
Proceedings of the Higher Order Logic Theorem Proving and its Applications, 1992

1991
Mechanizing Security in HOL.
Proceedings of the 1991 International Workshop on the HOL Theorem Proving System and its Applications, 1991

Mechanical Verification of Secure Distributed Systems in Higher Order Logic.
Proceedings of the 1991 International Workshop on the HOL Theorem Proving System and its Applications, 1991

Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

An application of template methodology: rapid prototyping of user interface management systems.
Proceedings of the Second International Workshop on Rapid System Prototyping, 1991

Effectiveness of operating system prototyping from a template: application to MINIX.
Proceedings of the Second International Workshop on Rapid System Prototyping, 1991

CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms.
Proceedings of the Proceedings 6th Annual Knowledge-Based Software Engineering Conference, 1991

A system for distributed intrusion detection.
Proceedings of the Compcon Spring '91, San Francisco, 1991

Towards a testbed for malicious code detection.
Proceedings of the Compcon Spring '91, San Francisco, 1991

The verification of secure distributed systems.
Proceedings of the Compcon Spring '91, San Francisco, 1991

1990
A Network Security Monitor.
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990

A template for rapid prototyping of operating systems.
Proceedings of the First International Workshop on Rapid System Prototyping, 1990

1985
Overview of applications.
ACM SIGSOFT Softw. Eng. Notes, 1985

1981
Recent SRI work in verification.
ACM SIGSOFT Softw. Eng. Notes, 1981

1979
Writing Simulatable Specifications in SPECIAL.
Proceedings of the Use of Formal Specification of Software, 1979

1978
An Example of Hierarchical Design and Proof.
Commun. ACM, 1978

1977
Proof Techniques for Hierarchically Structured Programs.
Commun. ACM, 1977

Proving Multilevel Security of a System Design.
Proceedings of the Sixth Symposium on Operating System Principles, 1977

1976
The Design, Analysis, and Verification of the SIFT Fault-Tolerant System.
Proceedings of the 2nd International Conference on Software Engineering, 1976

Software Development and Proofs of Multi-Level Security.
Proceedings of the 2nd International Conference on Software Engineering, 1976

1975
On attaining reliable software for a secure operating system.
Proceedings of the International Conference on Reliable Software 1975, 1975

SELECT - a formal system for testing and debugging programs by symbolic execution.
Proceedings of the International Conference on Reliable Software 1975, 1975

1974
An Organization for a Highly Survivable Memory.
IEEE Trans. Computers, 1974

Reasoning about Programs.
Artif. Intell., 1974

1973
Report of evening session on hierarchical methods.
Proceedings of the Proceeding of ACM SIGPLAN-SIGOPS Interface Meeting on Programming Languages, 1973

1972
An Assessment of Techniques for Proving Program Correctness.
ACM Comput. Surv., 1972

Cellular Arrays for the Solution of Graph Problems.
Commun. ACM, 1972

The application of program-proving techniques to the verification of synchronization processes.
Proceedings of the American Federation of Information Processing Societies: Proceedings of the AFIPS '72 Fall Joint Computer Conference, December 5-7, 1972, Anaheim, California, USA, 1972

1971
Software Reliability.
Computer, 1971

1970
R70-38 The Time Required for Group Multiplication.
IEEE Trans. Computers, 1970

1969
Cellular arrays for the parallel implementation of binary error-correcting codes.
IEEE Trans. Inf. Theory, 1969

A survey of progress in coding theory in the Soviet Union.
IEEE Trans. Inf. Theory, 1969

Module Clustering to Minimize Delay in Digital Networks.
IEEE Trans. Computers, 1969

1968
Cellular Interconnection Arrays.
IEEE Trans. Computers, 1968

A study of the data commutation problems in a self-repairable multiprocessor.
Proceedings of the American Federation of Information Processing Societies: AFIPS Conference Proceedings: 1968 Spring Joint Computer Conference, Atlantic City, NJ, USA, 30 April, 1968

1967
A class of nonlinear error correcting codes based upon interleaved two-level sequences (Corresp.).
IEEE Trans. Inf. Theory, 1967


  Loading...