Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Anup K. Ghosh
2010 – today
- 2013
[e3]Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang (Eds.): Moving Target Defense II - Application of Game Theory and Adversarial Modeling. Advances in Information Security 100, Springer 2013, ISBN 978-1-4614-5415-1- 2012
[j8]Anup K. Ghosh, Gary McGraw: Lost Decade or Golden Era: Computer Security since 9/11. IEEE Security & Privacy 10(1): 6-10 (2012)- 2011
[j7]Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia, Angelos Stavrou: The ephemeral legion: producing an expert cyber-security work force from thin air. Commun. ACM 54(1): 129-131 (2011)
[c21]Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia: Trading Elephants for Ants: Efficient Post-attack Reconstitution. SecureComm 2011: 460-469
[p2]Yih Huang, Anup K. Ghosh: Introducing Diversity and Uncertainty to Create Moving Attack Surfaces for Web Services. Moving Target Defense 2011: 131-151
[e2]Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang (Eds.): Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats. Advances in Information Security 54, Springer 2011, ISBN 978-1-4614-0976-2- 2010
[c20]Yih Huang, Anup K. Ghosh, Tom Bracewell, Brian Mastropietro: A security evaluation of a novel resilient web serving architecture: Lessons learned through industry/academia collaboration. DSN Workshops 2010: 188-193
[c19]Jiang Wang, Yih Huang, Anup K. Ghosh: SafeFox: A Safe Lightweight Virtual Browsing Environment. HICSS 2010: 1-10
[c18]Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anup K. Ghosh: A Virtualization Architecture for In-Depth Kernel Isolation. HICSS 2010: 1-10
[c17]Jiang Wang, Angelos Stavrou, Anup K. Ghosh: HyperCheck: A Hardware-Assisted Integrity Monitor. RAID 2010: 158-177
2000 – 2009
- 2009
[c16]- 2008
[j6]Anup K. Ghosh, Amitava Mukherjee, Debashis Saha: TCP throughput enhancement in wired-cum-wireless network. Computer Communications 31(17): 4162-4166 (2008)
[c15]Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia: Efficiently tracking application interactions using lightweight virtualization. VMSec 2008: 19-28
[c14]Jiang Wang, Anup K. Ghosh, Yih Huang: Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites. CollaborateCom 2008: 24-33- 2007
[j5]Michael N. Gagnon, Stephen Taylor, Anup K. Ghosh: Software Protection through Anti-Debugging. IEEE Security & Privacy 5(3): 82-84 (2007)
[c13]Anup K. Ghosh, Sudipto Das, Rajesh Roy, Amitava Mukherjee: Sender Side Intelligence for TCP Throughput Enhancement in Wired-Cum-Wireless Network. PIMRC 2007: 1-5- 2002
[j4]Anup K. Ghosh, Chuck Howell, James A. Whittaker: Building Software Securely from the Ground Up. IEEE Software 19(1): 14-16 (2002)
[j3]Christoph C. Michael, Anup K. Ghosh: Simple, state-based approaches to program-based anomaly detection. ACM Trans. Inf. Syst. Secur. 5(3): 203-237 (2002)
[c12]Matthew Schmid, Frank Hill, Anup K. Ghosh: Protecting Data from Malicious Software. ACSAC 2002: 199-208- 2001
[j2]Anup K. Ghosh, Tara M. Swaminatha: Software security and privacy risks in mobile e-commerce. Commun. ACM 44(2): 51-57 (2001)
[c11]Matt Bishop, Anup K. Ghosh, James A. Whittaker: How Useful is Software Fault Injection for Evaluating the Security of COTS Products? ACSAC 2001: 339-340
[p1]Anup K. Ghosh: New Security Issues in Mobile E-Commerce. E-Commerce Security and Privacy 2001: 29-46
[e1]Anup K. Ghosh (Ed.): E-Commerce Security and Privacy. Advances in Information Security 2, Springer 2001, ISBN 0-7923-7399-5- 2000
[c10]Christoph C. Michael, Anup K. Ghosh: Two State-based Approaches to Program-based Anomaly Detection. ACSAC 2000: 21-
[c9]Christoph C. Michael, Anup K. Ghosh: Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report. Recent Advances in Intrusion Detection 2000: 66-79
[c8]Anup K. Ghosh, Christoph C. Michael, Michael Schatz: A Real-Time Intrusion Detection System Based on Learning Program Behavior. Recent Advances in Intrusion Detection 2000: 93-109
1990 – 1999
- 1999
[j1]Anup K. Ghosh, Jeffrey M. Voas: Inoculating Software for Survivability. Commun. ACM 42(7): 38-44 (1999)
[c7]Anup K. Ghosh, Aaron Schwartzbard: Analyzing the Performance of Program Behavior Profiling for Intrusion Detection. DBSec 1999: 19-32
[c6]Anup K. Ghosh, Matthew Schmid, Frank Hill: Wrapping Windows NT Software for Robustness. FTCS 1999: 344-347
[c5]Anup K. Ghosh, Aaron Schwartzbard, Michael Schatz: Learning Program Behavior Profiles for Intrusion Detection. Workshop on Intrusion Detection and Network Monitoring 1999: 51-62
[c4]Aaron Schwartzbard, Anup K. Ghosh: A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT. Recent Advances in Intrusion Detection 1999
[c3]- 1998
[c2]
[c1]Anup K. Ghosh, Tom O'Connor, Gary McGraw: An Automated Approach for Identifying Potential Vulnerabilities in Software. IEEE Symposium on Security and Privacy 1998: 104-114
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:20 CEST by the dblp team



