Ramkumar Chinchani
Duc T. Ha
Shambhu J. Upadhyaya
Hung Q. Ngo 0001
Suranjan Pramanik
Ramkumar Chinchani
Sunu Mathew
Insider Threat Analysis Using Information-Centric Modeling.
55-73
2007
IFIP Int. Conf. Digital Forensics
https://doi.org/10.1007/978-0-387-73742-3_4
http://dl.ifip.org/db/conf/ifip11-9/df2007/HaUNPCM07.pdf
conf/ifip11-9/2007
db/conf/ifip11-9/df2007.html#HaUNPCM07
Madhusudhanan Chandrasekaran
Ramkumar Chinchani
Shambhu J. Upadhyaya
PHONEY: Mimicking User Response to Detect Phishing Attacks.
668-672
2006
conf/wowmom/2006
WOWMOM
https://doi.org/10.1109/WOWMOM.2006.87
https://doi.ieeecomputersociety.org/10.1109/WOWMOM.2006.87
db/conf/wowmom/wowmom2006.html#ChandrasekaranCU06
Ramkumar Chinchani
Duc T. Ha
Anusha Iyer
Hung Q. Ngo 0001
Shambhu J. Upadhyaya
On the Hardness of Approximating the Min-Hack Problem.
295-311
2005
9
J. Comb. Optim.
3
https://doi.org/10.1007/s10878-005-1413-8
db/journals/jco/jco9.html#ChinchaniHINU05
Ramkumar Chinchani
Anusha Iyer
Hung Q. Ngo 0001
Shambhu J. Upadhyaya
Towards a Theory of Insider Threat Assessment.
108-117
2005
conf/dsn/2005
DSN
https://doi.org/10.1109/DSN.2005.94
https://doi.ieeecomputersociety.org/10.1109/DSN.2005.94
db/conf/dsn/dsn2005.html#ChinchaniINU05
Ramkumar Chinchani
Eric van den Berg
A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows.
284-308
2005
conf/raid/2005
RAID
https://doi.org/10.1007/11663812_15
db/conf/raid/raid2005.html#ChinchaniB05
Ramkumar Chinchani
Aarthie Muthukrishnan
Madhusudhanan Chandrasekaran
Shambhu J. Upadhyaya
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates.
189-204
2004
conf/acsac/2004
ACSAC
https://doi.org/10.1109/CSAC.2004.28
https://doi.ieeecomputersociety.org/10.1109/CSAC.2004.28
db/conf/acsac/acsac2004.html#ChinchaniMCU04
Ramkumar Chinchani
Anusha Iyer
Bharat Jayaraman
Shambhu J. Upadhyaya
ARCHERR: Runtime Environment Driven Program Safety.
385-406
https://doi.org/10.1007/978-3-540-30108-0_24
2004
conf/esorics/2004
ESORICS
db/conf/esorics/esorics2004.html#ChinchaniIJU04
Ramkumar Chinchani
Anusha Iyer
Bharat Jayaraman
Shambhu J. Upadhyaya
Insecure Programming: How Culpable is a Language's Syntax?
158-163
2003
conf/iaw/2003
IAW
db/conf/iaw/iaw2003.html#ChinchaniIJU03
Ramkumar Chinchani
Shambhu J. Upadhyaya
Kevin A. Kwiat
A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors.
25-36
2003
conf/iwia/2003
IWIA
https://doi.org/10.1109/IWIAS.2003.1192456
https://doi.ieeecomputersociety.org/10.1109/IWIAS.2003.1192456
db/conf/iwia/iwia2003.html#ChinchaniUK03
Shambhu J. Upadhyaya
Ramkumar Chinchani
Kevin A. Kwiat
An Analytical Framework for Reasoning about Intrusions.
99-
2001
conf/srds/2001
SRDS
https://doi.org/10.1109/RELDIS.2001.969760
https://doi.ieeecomputersociety.org/10.1109/RELDIS.2001.969760
db/conf/srds/srds2001.html#UpadhyayaCK01
Eric van den Berg
Madhusudhanan Chandrasekaran
Duc T. Ha
Anusha Iyer
Bharat Jayaraman
Kevin A. Kwiat
Sunu Mathew
Aarthie Muthukrishnan
Hung Q. Ngo 0001
Suranjan Pramanik
Shambhu J. Upadhyaya