Anil Somayaji
Anil Somayaji
Associate Professor, School of Computer Science, Carleton University
Email confirmado em
Citado por
Citado por
A sense of self for unix processes
S Forrest, SA Hofmeyr, A Somayaji, TA Longstaff
Proceedings 1996 IEEE Symposium on Security and Privacy, 120-128, 1996
Intrusion detection using sequences of system calls
SA Hofmeyr, S Forrest, A Somayaji
Journal of computer security 6 (3), 151-180, 1998
Computer immunology
S Forrest, SA Hofmeyr, A Somayaji
Communications of the ACM 40 (10), 88-96, 1997
Building diverse computer systems
S Forrest, A Somayaji, DH Ackley
Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No …, 1997
A methodology for empirical analysis of permission-based security models and its application to android
D Barrera, HG Kayacik, PC van Oorschot, A Somayaji
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Principles of a computer immune system
A Somayaji, S Hofmeyr, S Forrest
Proceedings of the 1997 workshop on New security paradigms, 75-82, 1998
Automated Response Using System-Call Delay.
A Somayaji, S Forrest
Usenix Security Symposium, 185-197, 2000
Pass-thoughts: authenticating with our minds
J Thorpe, PC Van Oorschot, A Somayaji
Proceedings of the 2005 workshop on New security paradigms, 45-56, 2005
The evolution of system-call monitoring
S Forrest, S Hofmeyr, A Somayaji
2008 annual computer security applications conference (acsac), 418-430, 2008
A generic attack on checksumming-based software tamper resistance
G Wurster, PC Van Oorschot, A Somayaji
2005 IEEE Symposium on Security and Privacy (S&P'05), 127-138, 2005
Operating system stability and security through process homeostasis
AB Somayaji
University of New Mexico, 2002
Learning DFA representations of HTTP for protecting web applications
KL Ingham, A Somayaji, J Burge, S Forrest
Computer Networks 51 (5), 1239-1255, 2007
A clinical study of risk factors related to malware infections
F Lalonde Levesque, J Nsiempba, JM Fernandez, S Chiasson, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Hardware-assisted circumvention of self-hashing software tamper resistance
PC Van Oorschot, A Somayaji, G Wurster
IEEE Transactions on Dependable and Secure Computing 2 (2), 82-92, 2005
Analysis of the 1999 darpa/lincoln laboratory ids evaluation data with netadhict
C Brown, A Cowperthwaite, A Hijazi, A Somayaji
2009 IEEE Symposium on Computational Intelligence for Security and Defense …, 2009
SOMA: Mutual approval for included content in web pages
T Oda, G Wurster, PC van Oorschot, A Somayaji
Proceedings of the 15th ACM conference on Computer and communications …, 2008
Context-dependent authentication system, method and device
DC Dutt, AB Somayaji
US Patent 9,619,852, 2017
System and method for implicit authentication
DC Dutt, AB Somayaji, MJK Bingham
US Patent 9,788,203, 2017
Software diversity: security, entropy and game theory
S Neti, A Somayaji, ME Locasto
7th USENIX HotSec, 2012
Cloud Security: Attacks and Current Defenses
G Booth, A Soknacki, A Somayaji
8th Annual Symposium on Information Assurance (ASIA’13), 56, 2013
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20