Richard A. Kemmerer
Affiliations:- University of California, Santa Barbara, USA
According to our database1,
Richard A. Kemmerer
authored at least 112 papers
between 1979 and 2015.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 1997, "For contributions in the areas of formal specification and verification of systems, computer system security and reliability, specification language design, and software engineering.".
IEEE Fellow
IEEE Fellow 1995, "For contributions to formal methods in reliability and security of computer systems.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cs.ucsb.edu
On csauthors.net:
Bibliography
2015
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014
2013
20 Years of Network and Distributed Systems Security: The Good, the Bad, and the Ugly.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Control of Cyber-Physical Systems, 2013
2011
J. Syst. Softw., 2011
Proceedings of the Economics of Information Security and Privacy III [papers from the Tenth Workshop on Economics and Information Security, 2011
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011
MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011
2010
IEEE Trans. Software Eng., 2010
Proceedings of the ARES 2010, 2010
2009
Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008.
Comput. Sci. Res. Dev., 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Are your votes <i>really</i> counted?: testing the security of real-world electronic voting systems.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2008
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008
08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense.
Proceedings of the Perspectives Workshop: Network Attack Detection and Defense, 2.3., 2008
2007
J. Comput. Virol., 2007
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks.
Proceedings of the Network and Distributed System Security Symposium, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006
2005
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005
2004
IEEE Trans. Dependable Secur. Comput., 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
Theor. Comput. Sci., 2003
Generalized discrete timed automata: decidable approximations for safety verificatio.
Theor. Comput. Sci., 2003
Proceedings of the 11th ACM SIGSOFT Symposium on Foundations of Software Engineering 2003 held jointly with 9th European Software Engineering Conference, 2003
Proceedings of the 25th International Conference on Software Engineering, 2003
Proceedings of the 25th International Conference on Software Engineering, 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
J. Comput. Secur., 2002
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
2001
Proceedings of the E-Commerce Security and Privacy, 2001
Proceedings of the Implementation and Application of Automata, 2001
Proceedings of the STACS 2001, 2001
Proceedings of the Recent Advances in Intrusion Detection, 4th International Symposium, 2001
Proceedings of the Mobile Agents, 5th International Conference, 2001
Proceedings of the Computing and Combinatorics, 7th Annual International Conference, 2001
2000
Proceedings of the Mathematical Foundations of Computer Science 2000, 2000
Proceedings of the International Symposium on Software Testing and Analysis, 2000
Three approximation techniques for ASTRAL symbolic model checking of infinite state real-time systems.
Proceedings of the 22nd International Conference on on Software Engineering, 2000
Proceedings of the Fundamental Approaches to Software Engineering, 2000
Proceedings of the Computer Aided Verification, 12th International Conference, 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
1999
The Design and Analysis of Real-Time Systems Using the ASTRAL Software Development Environment.
Ann. Softw. Eng., 1999
Proceedings of the 6th International Workshop on Real-Time Computing and Applications Symposium (RTCSA '99), 1999
Proceedings of the 1999 International Conference on Software Engineering, 1999
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
1998
Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis, 1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1997
Proceedings of the First IEEE International Conference on Formal Engineering Methods, 1997
Proceedings of the Software Engineering, 1997
1996
Proceedings of the 1996 International Symposium on Software Testing and Analysis, 1996
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996
1995
IEEE Trans. Software Eng., 1995
Proceedings of the 5th European Software Engineering Conference, 1995
1994
IEEE Trans. Software Eng., 1994
Proceedings of the 1994 International Symposium on Software Testing and Analysis, 1994
1993
Proceedings of the 1993 International Symposium on Software Testing and Analysis, 1993
Proceedings of the Formal Methods in Systems Engineering, 1993
1992
IEEE Trans. Software Eng., 1992
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992
1991
IEEE Trans. Software Eng., 1991
Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991
Proceedings of the ESEC '91, 1991
1990
A Multilevel Formal Specification of a Mental Health Care Database.
Proceedings of the Database Security, 1990
1989
IEEE J. Sel. Areas Commun., 1989
Proceedings of the 11th International Conference on Software Engineering, 1989
Formal Specification of a Mental Health Delivery System.
Proceedings of the Database Security, 1989
1987
IEEE Trans. Software Eng., 1987
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987
Formal Specification and Verification Techniques for Secure Database Systems.
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987
Proceedings of the Advances in Cryptology, 1987
1986
IEEE Trans. Software Eng., 1986
1985
IEEE Trans. Software Eng., 1985
ACM SIGSOFT Softw. Eng. Notes, 1985
1983
Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels
ACM Trans. Comput. Syst., 1983
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983
1982
Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982
1981
1980
1979
Proceedings of the Seventh Symposium on Operating System Principles, 1979