Ramkumar Chinchani
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2000 – 2009
- 2007
- [c9]Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, Suranjan Pramanik, Ramkumar Chinchani, Sunu Mathew:
Insider Threat Analysis Using Information-Centric Modeling. IFIP Int. Conf. Digital Forensics 2007: 55-73 - 2006
- [c8]Madhusudhanan Chandrasekaran, Ramkumar Chinchani, Shambhu J. Upadhyaya:
PHONEY: Mimicking User Response to Detect Phishing Attacks. WOWMOM 2006: 668-672 - 2005
- [j1]Ramkumar Chinchani, Duc T. Ha, Anusha Iyer, Hung Q. Ngo, Shambhu J. Upadhyaya:
On the Hardness of Approximating the Min-Hack Problem. J. Comb. Optim. 9(3): 295-311 (2005) - [c7]Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Shambhu J. Upadhyaya:
Towards a Theory of Insider Threat Assessment. DSN 2005: 108-117 - [c6]Ramkumar Chinchani, Eric van den Berg:
A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows. RAID 2005: 284-308 - 2004
- [c5]Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusudhanan Chandrasekaran, Shambhu J. Upadhyaya:
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates. ACSAC 2004: 189-204 - [c4]Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya:
ARCHERR: Runtime Environment Driven Program Safety. ESORICS 2004: 385-406 - 2003
- [c3]Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya:
Insecure Programming: How Culpable is a Language's Syntax? IAW 2003: 158-163 - [c2]Ramkumar Chinchani, Shambhu J. Upadhyaya, Kevin A. Kwiat:
A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors. IWIA 2003: 25-36 - 2001
- [c1]Shambhu J. Upadhyaya, Ramkumar Chinchani, Kevin A. Kwiat:
An Analytical Framework for Reasoning about Intrusions. SRDS 2001: 99-
Coauthor Index
last updated on 2019-01-09 01:05 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint