Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype
- Steven R. Snapp, J. Brentano, +9 authors Doug Mansur
- Computer Science
- 1 October 1997
TLDR
- 465
- 24
- PDF
A network security monitor
- L. T. Herberlein, G. Dias, K. Levitt, B. Mukherjee, J. Wood, D. Wolber
- Computer Science
- Proceedings. IEEE Computer Society Symposium on…
- 7 May 1990
TLDR
DEMIDS: A Misuse Detection System for Database Systems
- C. Y. Chung, M. Gertz, K. Levitt
- Computer Science
- IICIS
- 1 June 2000
TLDR
A general cooperative intrusion detection architecture for MANETs
- D. Sterne, P. Balasubramanyam, +8 authors J. Rowe
- Engineering, Computer Science
- Third IEEE International Workshop on Information…
- 23 March 2005
TLDR
A specification-based intrusion detection system for AODV
- Chin-Yang Tseng, P. Balasubramanyam, C. Ko, Rattapon Limprasittiporn, J. Rowe, K. Levitt
- Computer Science
- SASN '03
- 31 October 2003
TLDR
SELECT—a formal system for testing and debugging programs by symbolic execution
TLDR
Security vulnerabilities of connected vehicle streams and their impact on cooperative driving
- M. Amoozadeh, Arun Raghuramu, +4 authors K. Levitt
- Computer Science
- IEEE Communications Magazine
- 10 June 2015
TLDR
Using Specification-Based Intrusion Detection for Automated Response
- Ivan Balepin, S. Maltsev, J. Rowe, K. Levitt
- Computer Science
- RAID
- 8 September 2003
TLDR
Execution monitoring of security-critical programs in distributed systems: a specification-based approach
- C. Ko, M. Ruschitzka, K. Levitt
- Computer Science
- Proceedings. IEEE Symposium on Security and…
- 4 May 1997
TLDR
GrIDS A Graph-Based Intrusion Detection System for Large Networks
- Stuart Staniford-Chen, Steven Cheung, +7 authors Dan Zerkle
- Computer Science
- 1996
TLDR
- 409
- 11
- PDF