|
Ramkumar Chinchani, Shambhu Upadhyaya and Kevin Kwiat,
"A Tamper-Resistant Framework or Unambiguous Detection
Of Attacks in User Space Using Process Monitors",
1st IEEE Workshop on Information Assurance, Germany,
2003. |
PDF File |
|
Ramkumar Chinchani, Shambhu Upadhyaya and Kevin Kwiat,
"Towards the Scalable Implementation of an Anomaly
Detection System",
MILCOM 2002, Anaheim, CA, USA, 2002. |
PDF File |
|
S. Upadhyaya, R. Chinchani, K. Kwiat,
"An Analytical Framework for Reasoning About Intrusions"
20th IEEE Symposium on Reliable Distributed Systems, New
Orleans, LA, October 2001, pp. 99-108. |
PDF File |
|
S. Upadhyaya, R. Chinchani and K. Kwiat,
"A Comprehensive Reasoning Framework About Information
Survivability",
2nd IEEE SMC IA&S Workshop, West Point, New York, USA,
June 2001. |
PDF File |
|
Hardekopf B., K. Kwiat and S. Upadhyaya,
"A decentralized voting algorithm for increasing
dependability in distributed systems",
Joint Meeting of the 5th World Multiconference on
Systemics, Cybernetics and Informatics (SCI 2001) and
the 7th International Conference on Information Systems
Analysis and Synthesis (ISAS 2001), Orlando, FL, July
22-25, 2001. |
PDF File |
|
Hardekopf B., K. Kwiat and
S. Upadhyaya,
"Secure and fault-tolerant voting in distributed
systems",
2001 IEEE Aerospace Conference, Big Sky, Montana, March
2001. |
PDF File |
|
K. Mantha, R. Chinchani, S. Upadhyaya and K. Kwiat,
"Simulation of Intrusion Detection in Distributed
Systems",
SCS Summer Simulation Conference, Vancouver, Canada,
July 2000. |
PDF File |
|
S. Upadhyaya and K. Kwiat,
"A Distributed Concurrent Intrusion Detection Scheme
Based on Assertions",
SCS International Symposium on Performance Evaluation of
Computer and Telecommunication Systems, Chicago, IL, pp.
369-376, July 1999. |
PDF File |
|