BibTeX records: Ramkumar Chinchani

download as .bib file

@inproceedings{DBLP:conf/ifip11-9/HaUNPCM07,
  author       = {Duc T. Ha and
                  Shambhu J. Upadhyaya and
                  Hung Q. Ngo and
                  Suranjan Pramanik and
                  Ramkumar Chinchani and
                  Sunu Mathew},
  editor       = {Philip Craiger and
                  Sujeet Shenoi},
  title        = {Insider Threat Analysis Using Information-Centric Modeling},
  booktitle    = {Advances in Digital Forensics {III} - {IFIP} International Conference
                  on Digital Forensics, National Centre for Forensic Science, Orlando,
                  Florida, USA, January 28-31, 2007},
  series       = {{IFIP}},
  volume       = {242},
  pages        = {55--73},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-73742-3\_4},
  doi          = {10.1007/978-0-387-73742-3\_4},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/HaUNPCM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/ChandrasekaranCU06,
  author       = {Madhusudhanan Chandrasekaran and
                  Ramkumar Chinchani and
                  Shambhu J. Upadhyaya},
  title        = {{PHONEY:} Mimicking User Response to Detect Phishing Attacks},
  booktitle    = {2006 International Symposium on a World of Wireless, Mobile and Multimedia
                  Networks (WoWMoM 2006), 26-29 June 2006, Buffalo, New York, USA, Proceedings},
  pages        = {668--672},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/WOWMOM.2006.87},
  doi          = {10.1109/WOWMOM.2006.87},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/ChandrasekaranCU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jco/ChinchaniHINU05,
  author       = {Ramkumar Chinchani and
                  Duc T. Ha and
                  Anusha Iyer and
                  Hung Q. Ngo and
                  Shambhu J. Upadhyaya},
  title        = {On the Hardness of Approximating the Min-Hack Problem},
  journal      = {J. Comb. Optim.},
  volume       = {9},
  number       = {3},
  pages        = {295--311},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10878-005-1413-8},
  doi          = {10.1007/S10878-005-1413-8},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jco/ChinchaniHINU05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ChinchaniINU05,
  author       = {Ramkumar Chinchani and
                  Anusha Iyer and
                  Hung Q. Ngo and
                  Shambhu J. Upadhyaya},
  title        = {Towards a Theory of Insider Threat Assessment},
  booktitle    = {2005 International Conference on Dependable Systems and Networks {(DSN}
                  2005), 28 June - 1 July 2005, Yokohama, Japan, Proceedings},
  pages        = {108--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/DSN.2005.94},
  doi          = {10.1109/DSN.2005.94},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/ChinchaniINU05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChinchaniB05,
  author       = {Ramkumar Chinchani and
                  Eric van den Berg},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {A Fast Static Analysis Approach to Detect Exploit Code Inside Network
                  Flows},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {284--308},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_15},
  doi          = {10.1007/11663812\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChinchaniB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChinchaniMCU04,
  author       = {Ramkumar Chinchani and
                  Aarthie Muthukrishnan and
                  Madhusudhanan Chandrasekaran and
                  Shambhu J. Upadhyaya},
  title        = {{RACOON:} Rapidly Generating User Command Data For Anomaly Detection
                  From Customizable Templates},
  booktitle    = {20th Annual Computer Security Applications Conference {(ACSAC} 2004),
                  6-10 December 2004, Tucson, AZ, {USA}},
  pages        = {189--204},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CSAC.2004.28},
  doi          = {10.1109/CSAC.2004.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChinchaniMCU04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChinchaniIJU04,
  author       = {Ramkumar Chinchani and
                  Anusha Iyer and
                  Bharat Jayaraman and
                  Shambhu J. Upadhyaya},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {{ARCHERR:} Runtime Environment Driven Program Safety},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {385--406},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_24},
  doi          = {10.1007/978-3-540-30108-0\_24},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ChinchaniIJU04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaw/ChinchaniIJU03,
  author       = {Ramkumar Chinchani and
                  Anusha Iyer and
                  Bharat Jayaraman and
                  Shambhu J. Upadhyaya},
  title        = {Insecure Programming: How Culpable is a Language's Syntax?},
  booktitle    = {{IEEE} Systems, Man and Cybernetics Society Information Assurance
                  Workshop, June 18-20, 2003, West Point, New York, {USA}},
  pages        = {158--163},
  publisher    = {{IEEE}},
  year         = {2003},
  timestamp    = {Wed, 19 Apr 2006 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iaw/ChinchaniIJU03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/ChinchaniUK03,
  author       = {Ramkumar Chinchani and
                  Shambhu J. Upadhyaya and
                  Kevin A. Kwiat},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {A Tamper-Resistant Framework for Unambiguous Detection of Attacks
                  in User Space Using Process Monitors},
  booktitle    = {Proceedings of the First {IEEE} International Workshop on Information
                  Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany},
  pages        = {25--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IWIAS.2003.1192456},
  doi          = {10.1109/IWIAS.2003.1192456},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/ChinchaniUK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/UpadhyayaCK01,
  author       = {Shambhu J. Upadhyaya and
                  Ramkumar Chinchani and
                  Kevin A. Kwiat},
  title        = {An Analytical Framework for Reasoning about Intrusions},
  booktitle    = {20th Symposium on Reliable Distributed Systems {(SRDS} 2001), 28-31
                  October 2001, New Orleans, LA, {USA}},
  pages        = {99},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/RELDIS.2001.969760},
  doi          = {10.1109/RELDIS.2001.969760},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/UpadhyayaCK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics