John McHugh
Orcid: 0000-0003-2900-1966
According to our database1,
John McHugh
authored at least 54 papers
between 1985 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the New Security Paradigms Workshop, 2024
Position Paper: Personal Experience in the Technology Opportunities and Associated Risks of Healthcare Challenges in a Continuing Care Retirement Community (CCRC).
Proceedings of the 2024 Workshop on Cybersecurity in Healthcare, 2024
2023
Proceedings of the Mobile Web and Intelligent Information Systems, 2023
2017
2016
Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
2015
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
2014
2013
Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
2012
Proceedings of the 2012 USENIX Annual Technical Conference, 2012
2011
Proceedings of the Financial Cryptography and Data Security, 2011
Verified workflow-based software development for infrastructure sensing and control applications.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
2010
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
2009
Proceedings of the 6th International Workshop on Visualization for Cyber Security, 2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
2008
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?.
Proceedings of the Computer Security, 2008
Proceedings of the Detection of Intrusions and Malware, 2008
2007
NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior.
Proceedings of the 4th International Workshop on Visualization for Computer Security, 2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007
2006
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006
2005
Proceedings of the New Security Paradigms Workshop 2005, 2005
2004
Proceedings of the Computer Security, 2004
2003
Proceedings of the New Security Paradigms Workshop 2003, 2003
2002
Proceedings of the Information Hiding, 5th International Workshop, 2002
2001
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
2000
Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory.
ACM Trans. Inf. Syst. Secur., 2000
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000
1999
Secure group management in large distributed systems: what is a group and what does it do?
Proceedings of the 1999 Workshop on New Security Paradigms, 1999
Proceedings of the Information Hiding, Third International Workshop, 1999
1996
IEEE Trans. Software Eng., 1996
1993
1992
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992
Proceedings of the Conference Proceedings on TRI-Ada 1992, 1992
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992
Proceedings of the 30th Annual Southeast Regional Conference, 1992
1991
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991
1989
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989
1988
Comput. Secur., 1988
A Formal Definition for Information Flow in the Gypsy Expression Language.
Proceedings of the First IEEE Computer Security Foundations Workshop, 1988
1987
IEEE Trans. Software Eng., 1987
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987
1986
A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area Network.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986
1985
Proceedings of the 1985 IEEE Symposium on Security and Privacy, 1985