Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ramkumar Chinchani
@inproceedings{DBLP:conf/ifip11-9/HaUNPCM07, author = {Duc T. Ha and Shambhu J. Upadhyaya and Hung Q. Ngo and Suranjan Pramanik and Ramkumar Chinchani and Sunu Mathew}, editor = {Philip Craiger and Sujeet Shenoi}, title = {Insider Threat Analysis Using Information-Centric Modeling}, booktitle = {Advances in Digital Forensics {III} - {IFIP} International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007}, series = {{IFIP}}, volume = {242}, pages = {55--73}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73742-3\_4}, doi = {10.1007/978-0-387-73742-3\_4}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/HaUNPCM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/ChandrasekaranCU06, author = {Madhusudhanan Chandrasekaran and Ramkumar Chinchani and Shambhu J. Upadhyaya}, title = {{PHONEY:} Mimicking User Response to Detect Phishing Attacks}, booktitle = {2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), 26-29 June 2006, Buffalo, New York, USA, Proceedings}, pages = {668--672}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/WOWMOM.2006.87}, doi = {10.1109/WOWMOM.2006.87}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/ChandrasekaranCU06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jco/ChinchaniHINU05, author = {Ramkumar Chinchani and Duc T. Ha and Anusha Iyer and Hung Q. Ngo and Shambhu J. Upadhyaya}, title = {On the Hardness of Approximating the Min-Hack Problem}, journal = {J. Comb. Optim.}, volume = {9}, number = {3}, pages = {295--311}, year = {2005}, url = {https://doi.org/10.1007/s10878-005-1413-8}, doi = {10.1007/S10878-005-1413-8}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jco/ChinchaniHINU05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/ChinchaniINU05, author = {Ramkumar Chinchani and Anusha Iyer and Hung Q. Ngo and Shambhu J. Upadhyaya}, title = {Towards a Theory of Insider Threat Assessment}, booktitle = {2005 International Conference on Dependable Systems and Networks {(DSN} 2005), 28 June - 1 July 2005, Yokohama, Japan, Proceedings}, pages = {108--117}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/DSN.2005.94}, doi = {10.1109/DSN.2005.94}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/ChinchaniINU05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChinchaniB05, author = {Ramkumar Chinchani and Eric van den Berg}, editor = {Alfonso Valdes and Diego Zamboni}, title = {A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {284--308}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_15}, doi = {10.1007/11663812\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChinchaniB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChinchaniMCU04, author = {Ramkumar Chinchani and Aarthie Muthukrishnan and Madhusudhanan Chandrasekaran and Shambhu J. Upadhyaya}, title = {{RACOON:} Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates}, booktitle = {20th Annual Computer Security Applications Conference {(ACSAC} 2004), 6-10 December 2004, Tucson, AZ, {USA}}, pages = {189--204}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CSAC.2004.28}, doi = {10.1109/CSAC.2004.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChinchaniMCU04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChinchaniIJU04, author = {Ramkumar Chinchani and Anusha Iyer and Bharat Jayaraman and Shambhu J. Upadhyaya}, editor = {Pierangela Samarati and Peter Y. A. Ryan and Dieter Gollmann and Refik Molva}, title = {{ARCHERR:} Runtime Environment Driven Program Safety}, booktitle = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3193}, pages = {385--406}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30108-0\_24}, doi = {10.1007/978-3-540-30108-0\_24}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ChinchaniIJU04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaw/ChinchaniIJU03, author = {Ramkumar Chinchani and Anusha Iyer and Bharat Jayaraman and Shambhu J. Upadhyaya}, title = {Insecure Programming: How Culpable is a Language's Syntax?}, booktitle = {{IEEE} Systems, Man and Cybernetics Society Information Assurance Workshop, June 18-20, 2003, West Point, New York, {USA}}, pages = {158--163}, publisher = {{IEEE}}, year = {2003}, timestamp = {Wed, 19 Apr 2006 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iaw/ChinchaniIJU03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/ChinchaniUK03, author = {Ramkumar Chinchani and Shambhu J. Upadhyaya and Kevin A. Kwiat}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors}, booktitle = {Proceedings of the First {IEEE} International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany}, pages = {25--36}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IWIAS.2003.1192456}, doi = {10.1109/IWIAS.2003.1192456}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/ChinchaniUK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/UpadhyayaCK01, author = {Shambhu J. Upadhyaya and Ramkumar Chinchani and Kevin A. Kwiat}, title = {An Analytical Framework for Reasoning about Intrusions}, booktitle = {20th Symposium on Reliable Distributed Systems {(SRDS} 2001), 28-31 October 2001, New Orleans, LA, {USA}}, pages = {99}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/RELDIS.2001.969760}, doi = {10.1109/RELDIS.2001.969760}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/UpadhyayaCK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.