Anil Somayaji
Anil Somayaji
Associate Professor, School of Computer Science, Carleton University
Email confirmado em
Citado por
Citado por
A sense of self for unix processes
S Forrest, SA Hofmeyr, A Somayaji, TA Longstaff
Proceedings 1996 IEEE Symposium on Security and Privacy, 120-128, 1996
Intrusion detection using sequences of system calls
SA Hofmeyr, S Forrest, A Somayaji
Journal of computer security 6 (3), 151-180, 1998
Computer immunology
S Forrest, SA Hofmeyr, A Somayaji
Communications of the ACM 40 (10), 88-96, 1997
Building diverse computer systems
S Forrest, A Somayaji, DH Ackley
Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No …, 1997
A methodology for empirical analysis of permission-based security models and its application to android
D Barrera, HG Kayacik, PC van Oorschot, A Somayaji
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Principles of a computer immune system
A Somayaji, S Hofmeyr, S Forrest
Proceedings of the 1997 workshop on New security paradigms, 75-82, 1998
Automated Response Using System-Call Delay.
A Somayaji, S Forrest
Usenix Security Symposium, 185-197, 2000
Pass-thoughts: authenticating with our minds
J Thorpe, PC Van Oorschot, A Somayaji
Proceedings of the 2005 workshop on New security paradigms, 45-56, 2005
The evolution of system-call monitoring
S Forrest, S Hofmeyr, A Somayaji
2008 annual computer security applications conference (acsac), 418-430, 2008
A generic attack on checksumming-based software tamper resistance
G Wurster, PC Van Oorschot, A Somayaji
2005 IEEE Symposium on Security and Privacy (S&P'05), 127-138, 2005
Learning DFA representations of HTTP for protecting web applications
KL Ingham, A Somayaji, J Burge, S Forrest
Computer Networks 51 (5), 1239-1255, 2007
Operating system stability and security through process homeostasis
AB Somayaji
University of New Mexico, 2002
Hardware-assisted circumvention of self-hashing software tamper resistance
PC Van Oorschot, A Somayaji, G Wurster
IEEE Transactions on Dependable and Secure Computing 2 (2), 82-92, 2005
A clinical study of risk factors related to malware infections
F Lalonde Levesque, J Nsiempba, JM Fernandez, S Chiasson, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
SOMA: Mutual approval for included content in web pages
T Oda, G Wurster, PC van Oorschot, A Somayaji
Proceedings of the 15th ACM conference on Computer and communications …, 2008
Analysis of the 1999 darpa/lincoln laboratory ids evaluation data with netadhict
C Brown, A Cowperthwaite, A Hijazi, A Somayaji
2009 IEEE Symposium on Computational Intelligence for Security and Defense …, 2009
Context-dependent authentication system, method and device
DC Dutt, AB Somayaji
US Patent 9,619,852, 2017
Cloud Security: Attacks and Current Defenses
G Booth, A Soknacki, A Somayaji
8th Annual Symposium on Information Assurance (ASIA’13), 56, 2013
Software diversity: security, entropy and game theory
S Neti, A Somayaji, ME Locasto
7th USENIX HotSec, 2012
System and method for implicit authentication
DC Dutt, AB Somayaji, MJK Bingham
US Patent 9,788,203, 2017
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20