Richard Lippmann

According to our database1, Richard Lippmann authored at least 48 papers between 1978 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2015
Agent-based simulation for assessing network security risk due to unauthorized hardware.
Proceedings of the Symposium on Agent-Directed Simulation, 2015

2010
Machine learning in adversarial environments.
Machine Learning, 2010

EMBER: a global perspective on extreme malicious behavior.
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010

Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR.
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010

Temporally oblivious anomaly detection on large networks using functional peers.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

2009
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool.
Proceedings of the Visualization for Computer Security, 5th International Workshop, 2008

2007
An Interactive Attack Graph Cascade and Reachability Display.
Proceedings of the VizSEC 2007, 2007

2006
Machine Learning for Computer Security.
J. Mach. Learn. Res., 2006

Experience Using Active and Passive Mapping for Network Situational Awareness.
Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, 2006

Practical Attack Graph Generation for Network Defense.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2004
Testing static analysis tools using exploitable buffer overflows from open source code.
Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2004, Newport Beach, CA, USA, October 31, 2004

2002
Automated Generation and Analysis of Attack Graphs.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002

2001
Detecting and displaying novel computer attacks with Macroscope.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2001

2000
The 1999 DARPA off-line intrusion detection evaluation.
Computer Networks, 2000

Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000

1999
Results of the DARPA 1998 Offline Intrusion Detection Evaluation.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999

Improving Intrusion Detection Performance using Keyword Selection and Neural Networks.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999

1997
High-performance low-complexity wordspotting using neural networks.
IEEE Trans. Signal Processing, 1997

Speech recognition by machines and humans.
Speech Communication, 1997

Using missing feature theory to actively select features for robust speech recognition with interruptions, filtering and noise KN-37.
Proceedings of the Fifth European Conference on Speech Communication and Technology, 1997

1996
Accurate consonant perception without mid-frequency speech energy.
IEEE Trans. Speech and Audio Processing, 1996

Recognition by humans and machines: miles to go before we sleep.
Speech Communication, 1996

A Micropower Analog VLSI HMM State Decoder for Wordspotting.
Proceedings of the Advances in Neural Information Processing Systems 9, 1996

Improving wordspotting performance with artificially generated data.
Proceedings of the 1996 IEEE International Conference on Acoustics, 1996

1995
A comparison of signal processing front ends for automatic word recognition.
IEEE Trans. Speech and Audio Processing, 1995

1994
Book Review: Neural Networks, a Comprehensive Foundation, by Simon Haykin.
Int. J. Neural Syst., 1994

Predicting the Risk of Complications in Coronary Artery Bypass Operations using Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 7, 1994

Using Voice Transformations to Create Additional Training Talkers for Word Spotting.
Proceedings of the Advances in Neural Information Processing Systems 7, 1994

Wordspotter training using figure-of-merit back propagation.
Proceedings of ICASSP '94: IEEE International Conference on Acoustics, 1994

1993
Figure of Merit Training for Detection and Spotting.
Proceedings of the Advances in Neural Information Processing Systems 6, 1993

Evaluation and Analysis of Auditory Model Front Ends for Robust Speech Recognition Program Summary.
Proceedings of the Human Language Technology: Proceedings of a Workshop Held at Plainsboro, 1993

Hybrid neural-network/HMM approaches to wordspotting.
Proceedings of the IEEE International Conference on Acoustics, 1993

1992
A Boundary Hunting Radial Basis Function Classifier which Allocates Centers Constructively.
Proceedings of the Advances in Neural Information Processing Systems 5, [NIPS Conference, Denver, Colorado, USA, November 30, 1992

Evaluation and Analysis of Auditory Model Front Ends for Robust Speech Recognition Program Summary.
Proceedings of the Speech and Natural Language: Proceedings of a Workshop Held at Harriman, 1992

Comparison of Auditory Models for Robust Speech Recognition.
Proceedings of the Speech and Natural Language: Proceedings of a Workshop Held at Harriman, 1992

1991
Neural Network Classifiers Estimate Bayesian a posteriori Probabilities.
Neural Computation, 1991

Improved Hidden Markov Models Speech Recognition Using Radial Basis Function Networks.
Proceedings of the Advances in Neural Information Processing Systems 4, 1991

1990
Practical Characteristics of Neural Network and Conventional Patterns Classifiers.
Proceedings of the Advances in Neural Information Processing Systems 3, 1990

Using Genetic Algorithms to Improve Pattern Classification Performance.
Proceedings of the Advances in Neural Information Processing Systems 3, 1990

Using genetic algorithms to select and create features for pattern classification.
Proceedings of the IJCNN 1990, 1990

1989
Review of Neural Networks for Speech Recognition.
Neural Computation, 1989

Practical Characteristics of Neural Network and Conventional Pattern Classifiers on Artificial and Speech Problems.
Proceedings of the Advances in Neural Information Processing Systems 2, 1989

HMM Speech Recognition with Neural Net Discrimination.
Proceedings of the Advances in Neural Information Processing Systems 2, 1989

1988
Adaptive Neural Net Preprocessing for Signal Detection in Non-Gaussian Noise.
Proceedings of the Advances in Neural Information Processing Systems 1, 1988

1987
Neural Net and Traditional Classifiers.
Proceedings of the Neural Information Processing Systems, Denver, Colorado, USA, 1987, 1987

1978
The effect of amplitude compression on the intelligibility of speech for persons with sensorineural hearing loss.
PhD thesis, 1978


  Loading...