default search action
Calvin Ko
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2010
- [j1]Songjie Wei, Alefiya Hussain, Jelena Mirkovic, Calvin Ko:
Tools for worm experimentation on the DETER testbed. Int. J. Commun. Networks Distributed Syst. 5(1/2): 151-171 (2010)
2000 – 2009
- 2009
- [c20]Songjie Wei, Calvin Ko, Jelena Mirkovic, Alefiya Hussain:
Tools for worm experimentation on the DETER testbed. TRIDENTCOM 2009: 1-10 - 2007
- [c19]Brett Wilson, Calvin Ko, Alefiya Hussain:
SEER: A Security Experimentation EnviRonment for DETER. DETER 2007 - 2006
- [c18]Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko:
Measuring denial Of service. QoP 2006: 53-58 - [c17]Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt:
DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. RAID 2006: 249-271 - 2005
- [c16]Tao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt:
Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks. Formal Aspects in Security and Trust 2005: 16-33 - [c15]Daniel F. Sterne, Poornima Balasubramanyam, David Carman, Brett Wilson, Rajesh Talpade, Calvin Ko, Ravindra Balupari, Chinyang Henry Tseng, Thomas F. Bowen, Karl N. Levitt, Jeff Rowe:
A General Cooperative Intrusion Detection Architecture for MANETs. IWIA 2005: 57-70 - [c14]Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt:
A Specification-Based Intrusion Detection Model for OLSR. RAID 2005: 330-350 - 2004
- [c13]Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt:
Formal Reasoning About Intrusion Detection Systems. RAID 2004: 278-295 - 2003
- [c12]Calvin Ko:
System Health and Intrusion Monitoring: Technology Description. DISCEX (2) 2003: 27-29 - [c11]Calvin Ko, Karl N. Levitt:
System Health and Intrusion Monitoring (SHIM): Project Summary. DISCEX (2) 2003: 202-207 - [c10]Paul Brutch, Calvin Ko:
Challenges in Intrusion Detection for Wireless Ad-hoc Networks. SAINT Workshops 2003: 368-373 - [c9]Chinyang Henry Tseng, Poornima Balasubramanyam, Calvin Ko, Rattapon Limprasittiporn, Jeff Rowe, Karl N. Levitt:
A specification-based intrusion detection system for AODV. SASN 2003: 125-134 - 2002
- [c8]Dustin Lee, Jeff Rowe, Calvin Ko, Karl N. Levitt:
Detecting and Defending against Web-Server Fingerprinting. ACSAC 2002: 321-330 - [c7]Calvin Ko, Timothy Redmond:
Noninterference and Intrusion Detection. S&P 2002: 177-187 - 2001
- [c6]Calvin Ko, Paul Brutch, Jeff Rowe, Guy Tsafnat, Karl N. Levitt:
System Health and Intrusion Monitoring Using a Hierarchy of Constraints. Recent Advances in Intrusion Detection 2001: 190-204 - 2000
- [c5]Calvin Ko:
Logic Induction of Valid Behavior Specifications for Intrusion Detection. S&P 2000: 142-153 - [c4]Calvin Ko, Timothy Fraser, Lee Badger, Douglas Kilpatrickv:
Detecting and Countering System Intrusions Using Software Wrappers. USENIX Security Symposium 2000
1990 – 1999
- 1997
- [c3]Calvin Ko, Manfred Ruschitzka, Karl N. Levitt:
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. S&P 1997: 175-187 - 1994
- [c2]Calvin Ko, George Fink, Karl N. Levitt:
Automated detection of vulnerabilities in privileged programs by execution monitoring. ACSAC 1994: 134-144 - 1993
- [c1]Calvin Ko, Deborah A. Frincke, Terrance Goan, Todd L. Heberlein, Karl N. Levitt, Biswanath Mukherjee, Christopher Wee:
Analysis of an Algorithm for Distributed Recognition and Accountability. CCS 1993: 154-164
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint