Anup K. Ghosh
According to our database1,
Anup K. Ghosh
authored at least 38 papers
between 1997 and 2012.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2012
2011
Introducing Diversity and Uncertainty to Create Moving Attack Surfaces for Web Services.
Proceedings of the Moving Target Defense, 2011
Commun. ACM, 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security.
Proceedings of the First SysSec Workshop 2011, 2011
2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
A security evaluation of a novel resilient web serving architecture: Lessons learned through industry/academia collaboration.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2010), Chicago, Illinois, USA, June 28, 2010
2009
Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009
2008
Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites.
Proceedings of the Collaborative Computing: Networking, 2008
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008
2007
Sender Side Intelligence for TCP Throughput Enhancement in Wired-Cum-Wireless Network.
Proceedings of the IEEE 18th International Symposium on Personal, 2007
2002
ACM Trans. Inf. Syst. Secur., 2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
2001
Proceedings of the E-Commerce Security and Privacy, 2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
2000
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
1999
Proceedings of the First International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems, 1999
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999
A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999
An approach to testing COTS software for robustness to operating system exceptions and errors.
Proceedings of the 10th International Symposium on Software Reliability Engineering, 1999
Proceedings of the Workshop on Intrusion Detection and Network Monitoring, 1999
Proceedings of the Digest of Papers: FTCS-29, 1999
Analyzing the Performance of Program Behavior Profiling for Intrusion Detection.
Proceedings of the Research Advances in Database and Information Systems Security, 1999
1998
Proceedings of the Security and Privacy, 1998
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998
E-Commerce Security: No Silver Bullet.
Proceedings of the Database Security XII: Status and Prospects, 1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1997
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997