Calvin Ko
According to our database1,
Calvin Ko
authored at least 20 papers
between 1993 and 2010.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2010
Int. J. Commun. Networks Distributed Syst., 2010
2007
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007
2006
DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006
2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005
Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005
2004
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004
2003
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
2002
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
2001
Proceedings of the Recent Advances in Intrusion Detection, 4th International Symposium, 2001
2000
Proceedings of the 9th USENIX Security Symposium, 2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
1997
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
1994
Automated detection of vulnerabilities in privileged programs by execution monitoring.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994
1993
Proceedings of the CCS '93, 1993