


default search action
Anup K. Ghosh
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [e3]Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang:
Moving Target Defense II - Application of Game Theory and Adversarial Modeling. Advances in Information Security 100, Springer 2013, ISBN 978-1-4614-5415-1 [contents] - 2012
- [j8]Anup K. Ghosh, Gary McGraw:
Lost Decade or Golden Era: Computer Security since 9/11. IEEE Secur. Priv. 10(1): 6-10 (2012) - 2011
- [j7]Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia
, Angelos Stavrou
:
The ephemeral legion: producing an expert cyber-security work force from thin air. Commun. ACM 54(1): 129-131 (2011) - [c28]Angelos D. Keromytis, Salvatore J. Stolfo, Junfeng Yang, Angelos Stavrou
, Anup K. Ghosh, Dawson R. Engler, Marc Dacier
, Matthew C. Elder, Darrell M. Kienzle:
The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security. SysSec@DIMVA 2011: 53-56 - [c27]Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou
, Anup K. Ghosh, Sushil Jajodia
:
Trading Elephants for Ants: Efficient Post-attack Reconstitution. SecureComm 2011: 460-469 - [p2]Yih Huang, Anup K. Ghosh:
Introducing Diversity and Uncertainty to Create Moving Attack Surfaces for Web Services. Moving Target Defense 2011: 131-151 - [e2]Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang:
Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats. Advances in Information Security 54, Springer 2011, ISBN 978-1-4614-0976-2 [contents] - 2010
- [c26]Yih Huang, Anup K. Ghosh, Tom Bracewell, Brian Mastropietro:
A security evaluation of a novel resilient web serving architecture: Lessons learned through industry/academia collaboration. DSN Workshops 2010: 188-193 - [c25]Jiang Wang, Yih Huang, Anup K. Ghosh:
SafeFox: A Safe Lightweight Virtual Browsing Environment. HICSS 2010: 1-10 - [c24]Jiang Wang, Sameer Niphadkar, Angelos Stavrou
, Anup K. Ghosh:
A Virtualization Architecture for In-Depth Kernel Isolation. HICSS 2010: 1-10 - [c23]Jiang Wang, Angelos Stavrou
, Anup K. Ghosh:
HyperCheck: A Hardware-Assisted Integrity Monitor. RAID 2010: 158-177
2000 – 2009
- 2009
- [c22]Yih Huang, Anup K. Ghosh:
Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services. NCA 2009: 114-117 - 2008
- [j6]Anup K. Ghosh, Amitava Mukherjee
, Debashis Saha
:
TCP throughput enhancement in wired-cum-wireless network. Comput. Commun. 31(17): 4162-4166 (2008) - [c21]Yih Huang, Angelos Stavrou
, Anup K. Ghosh, Sushil Jajodia:
Efficiently tracking application interactions using lightweight virtualization. VMSec 2008: 19-28 - [c20]Jiang Wang, Anup K. Ghosh, Yih Huang:
Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites. CollaborateCom 2008: 24-33 - 2007
- [j5]Michael N. Gagnon, Stephen Taylor, Anup K. Ghosh:
Software Protection through Anti-Debugging. IEEE Secur. Priv. 5(3): 82-84 (2007) - [c19]Anup K. Ghosh, Sudipto Das, Rajesh Roy, Amitava Mukherjee
:
Sender Side Intelligence for TCP Throughput Enhancement in Wired-Cum-Wireless Network. PIMRC 2007: 1-5 - 2002
- [j4]Anup K. Ghosh, Chuck Howell, James A. Whittaker:
Building Software Securely from the Ground Up. IEEE Softw. 19(1): 14-16 (2002) - [j3]Christoph C. Michael, Anup K. Ghosh:
Simple, state-based approaches to program-based anomaly detection. ACM Trans. Inf. Syst. Secur. 5(3): 203-237 (2002) - [c18]Matthew Schmid, Frank Hill, Anup K. Ghosh:
Protecting Data from Malicious Software. ACSAC 2002: 199-208 - 2001
- [j2]Anup K. Ghosh, Tara M. Swaminatha:
Software security and privacy risks in mobile e-commerce. Commun. ACM 44(2): 51-57 (2001) - [c17]Matt Bishop, Anup K. Ghosh, James A. Whittaker:
How Useful is Software Fault Injection for Evaluating the Security of COTS Products? ACSAC 2001: 339-340 - [p1]Anup K. Ghosh:
New Security Issues in Mobile E-Commerce. E-Commerce Security and Privacy 2001: 29-46 - [e1]Anup K. Ghosh:
E-Commerce Security and Privacy. Advances in Information Security 2, Springer 2001, ISBN 0-7923-7399-5 [contents] - 2000
- [c16]Christoph C. Michael, Anup K. Ghosh:
Two State-based Approaches to Program-based Anomaly Detection. ACSAC 2000: 21- - [c15]Christoph C. Michael, Anup K. Ghosh:
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report. Recent Advances in Intrusion Detection 2000: 66-79 - [c14]Anup K. Ghosh, Christoph C. Michael, Michael Schatz:
A Real-Time Intrusion Detection System Based on Learning Program Behavior. Recent Advances in Intrusion Detection 2000: 93-109
1990 – 1999
- 1999
- [j1]Anup K. Ghosh, Jeffrey M. Voas:
Inoculating Software for Survivability. Commun. ACM 42(7): 38-44 (1999) - [c13]Anup K. Ghosh, Aaron Schwartzbard:
Analyzing the Performance of Program Behavior Profiling for Intrusion Detection. DBSec 1999: 19-32 - [c12]Anup K. Ghosh, Matthew Schmid, Frank Hill:
Wrapping Windows NT Software for Robustness. FTCS 1999: 344-347 - [c11]Anup K. Ghosh, Aaron Schwartzbard, Michael Schatz:
Learning Program Behavior Profiles for Intrusion Detection. Workshop on Intrusion Detection and Network Monitoring 1999: 51-62 - [c10]Anup K. Ghosh, Matthew Schmid:
An approach to testing COTS software for robustness to operating system exceptions and errors. ISSRE 1999: 166-174 - [c9]Aaron Schwartzbard, Anup K. Ghosh:
A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT. Recent Advances in Intrusion Detection 1999 - [c8]Anup K. Ghosh, Aaron Schwartzbard:
A Study in Using Neural Networks for Anomaly and Misuse Detection. USENIX Security Symposium 1999 - [c7]Anup K. Ghosh:
Certifying E-Commerce Software for Security. WECWIS 1999: 64-67 - 1998
- [c6]Anup K. Ghosh, James Wanken, Frank Charron:
Detecting Anomalous and Unknown Intrusions Against Programs. ACSAC 1998: 259-267 - [c5]Anup K. Ghosh:
E-Commerce Security: No Silver Bullet. DBSec 1998: 3-16 - [c4]Anup K. Ghosh, Matthew Schmid, V. Shah:
Testing the robustness of Windows NT software. ISSRE 1998: 231-235 - [c3]Anup K. Ghosh:
On certifying mobile code for secure applications. ISSRE 1998: 381 - [c2]Anup K. Ghosh, Tom O'Connor, Gary McGraw:
An Automated Approach for Identifying Potential Vulnerabilities in Software. S&P 1998: 104-114 - 1997
- [c1]Jeffrey M. Voas, Anup K. Ghosh, Frank Charron, Lora Kassab:
Reducing uncertainty about common-mode failures. ISSRE 1997: 308-319
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint