Obserwuj
Robert K. Cunningham
Robert K. Cunningham
CMU and Pitt
Zweryfikowany adres z cunninghamfamily.net - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
RP Lippmann, DJ Fried, I Graf, JW Haines, KR Kendall, D McClung, ...
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
13692000
A taxonomy of computer worms
N Weaver, V Paxson, S Staniford, R Cunningham
Proceedings of the 2003 ACM workshop on Rapid Malcode, 11-18, 2003
7412003
Technique for detecting executable malicious code using a combination of static and dynamic analyses
R Khazan, J Rabek, S Lewandowski, R Cunningham
US Patent App. 10/464,828, 2005
4882005
Fusing a heterogeneous alert stream into scenarios
O Dain, RK Cunningham
Applications of Data Mining in Computer Security 6, 103-122, 2002
4132002
Improving intrusion detection performance using keyword selection and neural networks
RP Lippmann, RK Cunningham
Computer networks 34 (4), 597-603, 2000
3832000
Validating and restoring defense in depth using attack graphs
R Lippmann, K Ingols, C Scott, K Piwowarski, K Kratkiewicz, M Artz, ...
MILCOM 2006-2006 IEEE Military Communications Conference, 1-10, 2006
2802006
The real cost of software errors
M Zhivich, RK Cunningham
IEEE Security & Privacy 7 (2), 87-90, 2009
1672009
Detection of injected, dynamically generated, and obfuscated malicious code
JC Rabek, RI Khazan, SM Lewandowski, RK Cunningham
Proceedings of the 2003 ACM workshop on Rapid malcode, 76-82, 2003
1502003
Why measuring security is hard
S Pfleeger, R Cunningham
IEEE Security & Privacy 8 (4), 46-54, 2010
1472010
Building scenarios from a heterogeneous alert stream
OM Dain, RK Cunningham
Proceedings of the 2001 IEEE workshop on Information Assurance and Security 235, 2001
1462001
Gnuplot 4.5: an interactive plotting program. 2011
T Williams, C Kelley, HB Bröker, J Campbell, R Cunningham, D Denholm, ...
URL http://www. gnuplot. info 56, 2017
1432017
LARIAT: Lincoln adaptable real-time information assurance testbed
LM Rossey, RK Cunningham, DJ Fried, JC Rabek, RP Lippmann, ...
Proceedings, ieee aerospace conference 6, 6-6, 2002
1412002
Sok: Cryptographically protected database search
B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ...
2017 IEEE Symposium on Security and Privacy (SP), 172-191, 2017
1312017
Extending the darpa off-line intrusion detection evaluations
JW Haines, LM Rossey, RP Lippmann, RK Cunningham
Proceedings DARPA Information Survivability Conference and Exposition II …, 2001
1162001
Evaluating and strengthening enterprise network security using attack graphs
RP Lippmann, KW Ingols, C Scott, K Piwowarski, K Kratkiewicz, M Artz, ...
Technical Report ESC-TR-2005-064, MIT Lincoln Laboratory, 2005
1132005
Computing on masked data: a high performance method for improving big data veracity
J Kepner, V Gadepally, P Michaleas, N Schear, M Varia, A Yerukhimovich, ...
2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014
1042014
Evaluating intrusion detection systems without attacking your friends: The 1998 DARPA intrusion detection evaluation
RK Cunningham, RP Lippmann, DJ Fried, SL Garfinkel, I Graf, KR Kendall, ...
Massachusetts Inst Of Tech Lexington Lincoln Lab, 1999
1031999
Neural processing of targets in visible, multispectral IR and SAR imagery
AM Waxman, MC Seibert, A Gove, DA Fay, AM Bernardon, C Lazott, ...
Neural Networks 8 (7-8), 1029-1051, 1995
911995
Sok: Privacy on mobile devices–it’s complicated
C Spensky, J Stewart, A Yerukhimovich, R Shay, A Trachtenberg, ...
Proceedings on Privacy Enhancing Technologies 2016 (3), 96-116, 2016
492016
Large scale malicious code: A research agenda
N Weaver, V Paxson, S Staniford, R Cunningham
482003
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20