Karl N. Levitt
Orcid: 0000-0002-1464-2966Affiliations:
- University of California, Davis, USA
According to our database1,
Karl N. Levitt
authored at least 125 papers
between 1967 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles.
CoRR, 2022
Proceedings of the 2022 New Security Paradigms Workshop, 2022
2018
Proceedings of the New Security Paradigms Workshop, 2018
2016
Argument Comput., 2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the International Conference on Internet of Things and Big Data, 2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Automated cross layer feature selection for effective intrusion detection in networked systems.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
IEEE Trans. Dependable Secur. Comput., 2015
EURASIP J. Adv. Signal Process., 2015
Security vulnerabilities of connected vehicle streams and their impact on cooperative driving.
IEEE Commun. Mag., 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Cyber reasoning with argumentation: Abstracting from incomplete and contradictory evidence.
Proceedings of the 34th IEEE Military Communications Conference, 2015
2014
CoRR, 2014
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014
Proceedings of the 9th International Workshop on Feedback Computing, 2014
2013
Proceedings of the New Security Paradigms Workshop, 2013
Proceedings of the Trust and Autonomous Systems, 2013
2012
Proceedings of the New Security Paradigms Workshop, 2012
Proceedings of the Computational Models of Argument, 2012
Proceedings of the Computational Models of Argument, 2012
2011
Design and Implementation of FAITH, An Experimental System to Intercept and Manipulate Online Social Informatics.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011
2008
A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols.
Proceedings of the Second International Conference on Emerging Security Information, 2008
Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Using Soft-Line Recursive Response to Improve Query Aggregation in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008
2007
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
Proceedings of the 44th Design Automation Conference, 2007
DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2006
Proceedings of the 15th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2006), 2006
Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, 2006
DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET.
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006
Proceedings of the New Security Paradigms Workshop 2006, 2006
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006
2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005
Proceedings of the Active and Programmable Networks, 2005
Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005
2004
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004
Proceedings of the 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), 2004
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004
Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004
2003
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003
Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller.
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003
Immune System Model for Detecting Web Server Attacks.
Proceedings of the 2003 International Conference on Machine Learning and Applications, 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
2001
Proceedings of the Recent Advances in Intrusion Detection, 4th International Symposium, 2001
2000
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000
Proceedings of the Data and Application Security, 2000
1999
Theor. Comput. Sci., 1999
Softw. Test. Verification Reliab., 1999
DEMIDS: A Misuse Detection System for Database Systems.
Proceedings of the Integrity and Internal Control in Information Systems, 1999
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999
1998
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998
The Design and Implementation of a Data Level Database Inference Detection System.
Proceedings of the Database Security XII: Status and Prospects, 1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998
1997
Validation of Array Accesses: Integration of Flow Analysis and Program Verification Techniques.
Softw. Test. Verification Reliab., 1997
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
Protecting routing infrastructures from denial of service using cooperative intrusion detection.
Proceedings of the 1997 Workshop on New Security Paradigms, 1997
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997
1996
Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996, 1996
Proceedings of the Theorem Proving in Higher Order Logics, 9th International Conference, 1996
1995
Proceedings of the Higher Order Logic Theorem Proving and Its Applications, 1995
1994
Automated detection of vulnerabilities in privileged programs by execution monitoring.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994
Proceedings of the 10th Annual Computer Security Applications Conference, 1994
1993
Mechanizing a Programming Logic for the Concurrent Programming Language microSR in HOL.
Proceedings of the Higher Order Logic Theorem Proving and its Applications, 1993
Proceedings of the Higher Order Logic Theorem Proving and its Applications, 1993
Proceedings of the CCS '93, 1993
1992
Towards a Formal Verification of a Floating Point Coprocessor and its Composition with a Central Processing Unit.
Proceedings of the Higher Order Logic Theorem Proving and its Applications, 1992
Implementation and Use of Annotations in HOL.
Proceedings of the Higher Order Logic Theorem Proving and its Applications, 1992
A HOL Mechanisation of the Axiomatic Semantics of a Simple Distributed Programming Language.
Proceedings of the Higher Order Logic Theorem Proving and its Applications, 1992
1991
Mechanizing Security in HOL.
Proceedings of the 1991 International Workshop on the HOL Theorem Proving System and its Applications, 1991
Mechanical Verification of Secure Distributed Systems in Higher Order Logic.
Proceedings of the 1991 International Workshop on the HOL Theorem Proving System and its Applications, 1991
Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991
An application of template methodology: rapid prototyping of user interface management systems.
Proceedings of the Second International Workshop on Rapid System Prototyping, 1991
Proceedings of the Second International Workshop on Rapid System Prototyping, 1991
CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms.
Proceedings of the Proceedings 6th Annual Knowledge-Based Software Engineering Conference, 1991
Proceedings of the Compcon Spring '91, San Francisco, 1991
Proceedings of the Compcon Spring '91, San Francisco, 1991
Proceedings of the Compcon Spring '91, San Francisco, 1991
1990
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990
Proceedings of the First International Workshop on Rapid System Prototyping, 1990
1985
1981
1979
Proceedings of the Use of Formal Specification of Software, 1979
1978
1977
Proceedings of the Sixth Symposium on Operating System Principles, 1977
1976
Proceedings of the 2nd International Conference on Software Engineering, 1976
Proceedings of the 2nd International Conference on Software Engineering, 1976
1975
Proceedings of the International Conference on Reliable Software 1975, 1975
Proceedings of the International Conference on Reliable Software 1975, 1975
1974
1973
Proceedings of the Proceeding of ACM SIGPLAN-SIGOPS Interface Meeting on Programming Languages, 1973
1972
The application of program-proving techniques to the verification of synchronization processes.
Proceedings of the American Federation of Information Processing Societies: Proceedings of the AFIPS '72 Fall Joint Computer Conference, December 5-7, 1972, Anaheim, California, USA, 1972
1971
1970
1969
IEEE Trans. Inf. Theory, 1969
IEEE Trans. Inf. Theory, 1969
1968
Proceedings of the American Federation of Information Processing Societies: AFIPS Conference Proceedings: 1968 Spring Joint Computer Conference, Atlantic City, NJ, USA, 30 April, 1968
1967
A class of nonlinear error correcting codes based upon interleaved two-level sequences (Corresp.).
IEEE Trans. Inf. Theory, 1967