| 2010 |
22 | | Jiang Wang,
Sameer Niphadkar,
Angelos Stavrou,
Anup K. Ghosh:
A Virtualization Architecture for In-Depth Kernel Isolation.
HICSS 2010: 1-10 |
| 2009 |
21 | | Yih Huang,
Anup K. Ghosh:
Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services.
NCA 2009: 114-117 |
| 2008 |
20 | | Jiang Wang,
Anup K. Ghosh,
Yih Huang:
Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites.
CollaborateCom 2008: 24-33 |
19 | | Yih Huang,
Angelos Stavrou,
Anup K. Ghosh,
Sushil Jajodia:
Efficiently tracking application interactions using lightweight virtualization.
VMSec 2008: 19-28 |
18 | | Anup K. Ghosh,
Amitava Mukherjee,
Debashis Saha:
TCP throughput enhancement in wired-cum-wireless network.
Computer Communications 31(17): 4162-4166 (2008) |
| 2007 |
17 | | Michael N. Gagnon,
Stephen Taylor,
Anup K. Ghosh:
Software Protection through Anti-Debugging.
IEEE Security & Privacy 5(3): 82-84 (2007) |
| 2002 |
16 | | Matthew Schmid,
Frank Hill,
Anup K. Ghosh:
Protecting Data from Malicious Software.
ACSAC 2002: 199-208 |
15 | | Christoph C. Michael,
Anup K. Ghosh:
Simple, state-based approaches to program-based anomaly detection.
ACM Trans. Inf. Syst. Secur. 5(3): 203-237 (2002) |
14 | | Anup K. Ghosh,
Chuck Howell,
James A. Whittaker:
Building Software Securely from the Ground Up.
IEEE Software 19(1): 14-16 (2002) |
| 2001 |
13 | | Matt Bishop,
Anup K. Ghosh,
James A. Whittaker:
How Useful is Software Fault Injection for Evaluating the Security of COTS Products?
ACSAC 2001: 339-342 |
12 | | Anup K. Ghosh,
Tara M. Swaminatha:
Software security and privacy risks in mobile e-commerce.
Commun. ACM 44(2): 51-57 (2001) |
| 2000 |
11 | | Christoph C. Michael,
Anup K. Ghosh:
Two State-based Approaches to Program-based Anomaly Detection.
ACSAC 2000: 21- |
10 | | Christoph C. Michael,
Anup K. Ghosh:
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report.
Recent Advances in Intrusion Detection 2000: 66-79 |
9 | | Anup K. Ghosh,
Christoph C. Michael,
Michael Schatz:
A Real-Time Intrusion Detection System Based on Learning Program Behavior.
Recent Advances in Intrusion Detection 2000: 93-109 |
| 1999 |
8 | | Anup K. Ghosh,
Aaron Schwartzbard:
Analyzing the Performance of Program Behavior Profiling for Intrusion Detection.
DBSec 1999: 19-32 |
7 | | Anup K. Ghosh,
Matthew Schmid,
Frank Hill:
Wrapping Windows NT Software for Robustness.
FTCS 1999: 344-347 |
6 | | Aaron Schwartzbard,
Anup K. Ghosh:
A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT.
Recent Advances in Intrusion Detection 1999 |
5 | | Anup K. Ghosh:
Certifying E-Commerce Software for Security.
WECWIS 1999: 64-67 |
4 | | Anup K. Ghosh,
Aaron Schwartzbard,
Michael Schatz:
Learning Program Behavior Profiles for Intrusion Detection.
Workshop on Intrusion Detection and Network Monitoring 1999: 51-62 |
3 | | Anup K. Ghosh,
Jeffrey M. Voas:
Inoculating Software for Survivability.
Commun. ACM 42(7): 38-44 (1999) |
| 1998 |
2 | | Anup K. Ghosh:
E-Commerce Security: No Silver Bullet.
DBSec 1998: 3-16 |
1 | | Anup K. Ghosh,
Tom O'Connor,
Gary McGraw:
An Automated Approach for Identifying Potential Vulnerabilities in Software.
IEEE Symposium on Security and Privacy 1998: 104-114 |