Anup K. Ghosh Coauthor index DBLP Vis pubzone.org

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

DBLP keys2010
22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiang Wang, Sameer Niphadkar, Angelos Stavrou, Anup K. Ghosh: A Virtualization Architecture for In-Depth Kernel Isolation. HICSS 2010: 1-10
2009
21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYih Huang, Anup K. Ghosh: Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services. NCA 2009: 114-117
2008
20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiang Wang, Anup K. Ghosh, Yih Huang: Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites. CollaborateCom 2008: 24-33
19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia: Efficiently tracking application interactions using lightweight virtualization. VMSec 2008: 19-28
18Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAnup K. Ghosh, Amitava Mukherjee, Debashis Saha: TCP throughput enhancement in wired-cum-wireless network. Computer Communications 31(17): 4162-4166 (2008)
2007
17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael N. Gagnon, Stephen Taylor, Anup K. Ghosh: Software Protection through Anti-Debugging. IEEE Security & Privacy 5(3): 82-84 (2007)
2002
16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMatthew Schmid, Frank Hill, Anup K. Ghosh: Protecting Data from Malicious Software. ACSAC 2002: 199-208
15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChristoph C. Michael, Anup K. Ghosh: Simple, state-based approaches to program-based anomaly detection. ACM Trans. Inf. Syst. Secur. 5(3): 203-237 (2002)
14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAnup K. Ghosh, Chuck Howell, James A. Whittaker: Building Software Securely from the Ground Up. IEEE Software 19(1): 14-16 (2002)
2001
13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMatt Bishop, Anup K. Ghosh, James A. Whittaker: How Useful is Software Fault Injection for Evaluating the Security of COTS Products? ACSAC 2001: 339-342
12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAnup K. Ghosh, Tara M. Swaminatha: Software security and privacy risks in mobile e-commerce. Commun. ACM 44(2): 51-57 (2001)
2000
11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChristoph C. Michael, Anup K. Ghosh: Two State-based Approaches to Program-based Anomaly Detection. ACSAC 2000: 21-
10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChristoph C. Michael, Anup K. Ghosh: Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report. Recent Advances in Intrusion Detection 2000: 66-79
9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAnup K. Ghosh, Christoph C. Michael, Michael Schatz: A Real-Time Intrusion Detection System Based on Learning Program Behavior. Recent Advances in Intrusion Detection 2000: 93-109
1999
8no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAnup K. Ghosh, Aaron Schwartzbard: Analyzing the Performance of Program Behavior Profiling for Intrusion Detection. DBSec 1999: 19-32
7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAnup K. Ghosh, Matthew Schmid, Frank Hill: Wrapping Windows NT Software for Robustness. FTCS 1999: 344-347
6no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAaron Schwartzbard, Anup K. Ghosh: A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT. Recent Advances in Intrusion Detection 1999
5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAnup K. Ghosh: Certifying E-Commerce Software for Security. WECWIS 1999: 64-67
4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAnup K. Ghosh, Aaron Schwartzbard, Michael Schatz: Learning Program Behavior Profiles for Intrusion Detection. Workshop on Intrusion Detection and Network Monitoring 1999: 51-62
3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAnup K. Ghosh, Jeffrey M. Voas: Inoculating Software for Survivability. Commun. ACM 42(7): 38-44 (1999)
1998
2no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAnup K. Ghosh: E-Commerce Security: No Silver Bullet. DBSec 1998: 3-16
1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAnup K. Ghosh, Tom O'Connor, Gary McGraw: An Automated Approach for Identifying Potential Vulnerabilities in Software. IEEE Symposium on Security and Privacy 1998: 104-114

Coauthor Index

1Matt Bishop [13]
2Michael N. Gagnon [17]
3Frank Hill [7] [16]
4Charles Howell (Chuck Howell) [14]
5Yih Huang [19] [20] [21]
6Sushil Jajodia [19]
7Gary McGraw [1]
8Christoph C. Michael [9] [10] [11] [15]
9Amitava Mukherjee [18]
10Sameer Niphadkar [22]
11Tom O'Connor [1]
12Debashis Saha [18]
13Michael Schatz [4] [9]
14Matthew Schmid [7] [16]
15Aaron Schwartzbard [4] [6] [8]
16Angelos Stavrou [19] [22]
17Tara M. Swaminatha [12]
18Stephen Taylor [17]
19Jeffrey M. Voas [3]
20Jiang Wang [20] [22]
21James A. Whittaker [13] [14]

Colors in the list of coauthors

Copyright © Sun Mar 14 22:39:24 2010 by Michael Ley (ley@uni-trier.de)