


default search action
Karl N. Levitt
Person information
- affiliation: University of California, Davis, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c97]Richard Hull, Matt Bishop, Joseph Gendreau, Karl N. Levitt, Mohammad Sadoghi, Matthew Lange:
Conceptual modeling to advance agrifood cybersecurity ontologies. JOWO 2024 - 2022
- [c96]Michael Clifford
, Miriam Heller
, Karl N. Levitt
, Matt Bishop
:
Autonomous Vehicle Security: Composing Attack, Defense, and Policy Surfaces. NSPW 2022: 90-103 - [i4]Nidhi Rastogi, Sara Rampazzi, Michael Clifford, Miriam Heller, Matt Bishop, Karl N. Levitt:
Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles. CoRR abs/2203.00150 (2022)
2010 – 2019
- 2018
- [c95]Matt Bishop
, Carrie Gates, Karl N. Levitt:
Augmenting Machine Learning with Argumentation. NSPW 2018: 1-11 - 2016
- [j27]Andy Applebaum, Zimi Li, Karl N. Levitt, Simon Parsons
, Jeff Rowe, Elizabeth I. Sklar
:
Firewall configuration: An application of multiagent metalevel argumentation. Argument Comput. 7(2-3): 201-221 (2016) - [c94]Azeem Aqil, Ahmed Osama Fathy Atya, Srikanth V. Krishnamurthy
, Paul L. Yu, Ananthram Swami, Jeff Rowe, Karl N. Levitt, Alexander Poylisher, Constantin Serban, Ritu Chadha:
Automated cross layer feature selection for effective intrusion detection in networked systems. CNS 2016: 270-278 - [c93]Parisa Kianmajd, Jeff Rowe, Karl N. Levitt:
Privacy-preserving coordination for smart communities. INFOCOM Workshops 2016: 1045-1046 - [c92]Bogdan Copos, Karl N. Levitt, Jeff Rowe, Parisa Kianmajd, Chen-Nee Chuah, George Kesidis:
Security and Privacy for Emerging Smart Community Infrastructures. IoTBD 2016: 148-155 - [c91]Z. Berkay Celik, Nan Hu, Yun Li, Nicolas Papernot, Patrick D. McDaniel, Robert J. Walls, Jeff Rowe, Karl N. Levitt, Novella Bartolini
, Thomas F. La Porta, Ritu Chadha:
Mapping sample scenarios to operational models. MILCOM 2016: 7-12 - [c90]Sisi Duan, Yun Li, Karl N. Levitt:
Cost sensitive moving target consensus. NCA 2016: 272-281 - [c89]Bogdan Copos, Karl N. Levitt, Matt Bishop, Jeff Rowe:
Is Anybody Home? Inferring Activity From Smart Home Network Traffic. IEEE Symposium on Security and Privacy Workshops 2016: 245-251 - 2015
- [j26]Mani Amoozadeh, Arun Raghuramu, Chen-Nee Chuah
, Dipak Ghosal
, H. Michael Zhang, Jeff Rowe, Karl N. Levitt:
Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Commun. Mag. 53(6): 126-132 (2015) - [j25]Yuquan Shan, Jayaram Raghuram, George Kesidis, David J. Miller, Anna Scaglione, Jeff Rowe, Karl N. Levitt:
Generation bidding game with potentially false attestation of flexible demand. EURASIP J. Adv. Signal Process. 2015: 29 (2015) - [j24]Sisi Duan, Sean Peisert
, Karl N. Levitt:
hBFT: Speculative Byzantine Fault Tolerance with Minimum Cost. IEEE Trans. Dependable Secur. Comput. 12(1): 58-70 (2015) - [c88]Azeem Aqil, Ahmed Osama Fathy Atya, Trent Jaeger, Srikanth V. Krishnamurthy
, Karl N. Levitt, Patrick D. McDaniel, Jeff Rowe, Ananthram Swami:
Detection of stealthy TCP-based DoS attacks. MILCOM 2015: 348-353 - [c87]Andy Applebaum, Karl N. Levitt, Zimi Li, Simon Parsons, Jeff Rowe, Elizabeth Sklar:
Cyber reasoning with argumentation: Abstracting from incomplete and contradictory evidence. MILCOM 2015: 623-628 - [c86]Conner Jackson, Karl N. Levitt, Jeff Rowe, Srikanth V. Krishnamurthy
, Trent Jaeger, Ananthram Swami:
A diagnosis based intrusion detection approach. MILCOM 2015: 929-934 - 2014
- [j23]Simon Parsons, Katie Atkinson, Zimi Li, Peter McBurney
, Elizabeth Sklar, Munindar P. Singh
, Karen Zita Haigh, Karl N. Levitt, Jeff Rowe:
Argument schemes for reasoning about trust. Argument Comput. 5(2-3): 160-190 (2014) - [c85]Jayaram Raghuram, George Kesidis, Christopher Griffin, Karl N. Levitt, David J. Miller, Jeff Rowe, Anna Scaglione:
A Bidding Game for Generators in the Presence of Flexible Demand. Feedback Computing 2014 - [c84]Sisi Duan, Karl N. Levitt, Hein Meling, Sean Peisert
, Haibin Zhang:
ByzID: Byzantine Fault Tolerance from Intrusion Detection. SRDS 2014: 253-264 - [i3]Mahnoosh Alizadeh, Anna Scaglione, Andy Applebaum, George Kesidis, Karl N. Levitt:
Scalable and Anonymous Modeling of Large Populations of Flexible Appliances. CoRR abs/1404.1958 (2014) - [i2]Yuquan Shan, Jayaram Raghuram, George Kesidis, Christopher Griffin, Karl N. Levitt, David J. Miller, Jeff Rowe, Anna Scaglione:
Generation bidding game with flexible demand. CoRR abs/1408.6689 (2014) - 2013
- [c83]Simon Parsons, Elizabeth Sklar, Munindar P. Singh, Karl N. Levitt, Jeff Rowe:
An Argumentation-Based Approach to Handling Trust in Distributed Decision Making. AAAI Spring Symposium: Trust and Autonomous Systems 2013 - [c82]Jeff Rowe, Karl N. Levitt, Mike Hogarth:
Towards the realization of a public health system for shared secure cyber-space. NSPW 2013: 11-18 - 2012
- [c81]Andy Applebaum, Karl N. Levitt, Jeff Rowe, Simon Parsons:
Arguing About Firewall Policy. COMMA 2012: 91-102 - [c80]Simon Parsons, Katie Atkinson, Karen Zita Haigh, Karl N. Levitt, Peter McBurney, Jeff Rowe, Munindar P. Singh
, Elizabeth Sklar:
Argument Schemes for Reasoning about Trust. COMMA 2012: 430-441 - [c79]Jeff Rowe, Karl N. Levitt, Simon Parsons, Elizabeth Sklar, Andy Applebaum, Sharmin Jalal:
Argumentation logic to assist in security administration. NSPW 2012: 43-52 - 2011
- [c78]Ruaylong Lee, Roozbeh Nia, Jason Hsu, Karl N. Levitt, Jeff Rowe, Shyhtsun Felix Wu, Shaozhi Ye:
Design and Implementation of FAITH, An Experimental System to Intercept and Manipulate Online Social Informatics. ASONAM 2011: 195-202
2000 – 2009
- 2008
- [c77]Xiaoming Lu, Matt Spear, Karl N. Levitt, Norman S. Matloff, Shyhtsun Felix Wu:
Using Soft-Line Recursive Response to Improve Query Aggregation in Wireless Sensor Networks. ICC 2008: 2309-2316 - [c76]Xiaoming Lu, Matt Spear, Karl N. Levitt, Shyhtsun Felix Wu:
iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks. INFOCOM 2008: 968-976 - [c75]Senthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe:
Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. RAID 2008: 231-250 - [c74]Xiaoming Lu, Matt Spear, Karl N. Levitt, Norman S. Matloff, Shyhtsun Felix Wu:
A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. SECURWARE 2008: 403-411 - 2007
- [c73]Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis Hsu, Karl N. Levitt:
A framework for diversifying windows native APIs to tolerate code injection attacks. AsiaCCS 2007: 392-394 - [c72]Chinyang Henry Tseng, Shiau-Huey Wang, Karl N. Levitt:
DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET. AsiaCCS 2007: 395-397 - [c71]Cynthia E. Irvine, Karl N. Levitt:
Trusted Hardware: Can It Be Trustworthy? DAC 2007: 1-4 - [c70]Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matt Bishop:
Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. RAID 2007: 127-145 - 2006
- [c69]Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz, Karl N. Levitt, Matt Bishop:
Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs. DIMVA 2006: 1-16 - [c68]Senthilkumar G. Cheetancheri, Denys L. Ma, Karl N. Levitt, Todd L. Heberlein:
Towards a framework for worm-defense evaluation. IPCCC 2006 - [c67]Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lisa Clark, Karl N. Levitt:
Sanitization models and their limitations. NSPW 2006: 41-56 - [c66]Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt:
DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. RAID 2006: 249-271 - [c65]Senthilkumar G. Cheetancheri, John Mark Agosta, Denver Dash, Karl N. Levitt, Jeff Rowe, Eve M. Schooler:
A distributed host-based worm detection system. LSAD@SIGCOMM 2006: 107-113 - [c64]Matt Bishop, Rick Crawford, Bhume Bhumiratana, Lisa Clark, Karl N. Levitt:
Some Problems in Sanitizing Network Data. WETICE 2006: 307-312 - 2005
- [c63]Tao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt:
Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks. Formal Aspects in Security and Trust 2005: 16-33 - [c62]Marcus Tylutki, Karl N. Levitt:
A Network-Based Response Framework and Implementation. IWAN 2005: 65-82 - [c61]Daniel F. Sterne, Poornima Balasubramanyam, David Carman, Brett Wilson, Rajesh Talpade, Calvin Ko, Ravindra Balupari, Chinyang Henry Tseng, Thomas F. Bowen, Karl N. Levitt, Jeff Rowe:
A General Cooperative Intrusion Detection Architecture for MANETs. IWIA 2005: 57-70 - [c60]Chinyang Henry Tseng, Tao Song, Poornima Balasubramanyam, Calvin Ko, Karl N. Levitt:
A Specification-Based Intrusion Detection Model for OLSR. RAID 2005: 330-350 - 2004
- [j22]Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy
, Sally Floyd, Wes Hardaker, Anthony D. Joseph
, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David J. Miller, Russ Mundy, Clifford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu:
Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004) - [c59]Archana Pasupulati, Jason Coit, Karl N. Levitt, Shyhtsun Felix Wu, S. H. Li, J. C. Kuo, K. P. Fan:
Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities. NOMS (1) 2004: 235-248 - [c58]Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt:
Formal Reasoning About Intrusion Detection Systems. RAID 2004: 278-295 - [c57]Matt Bishop, Bhume Bhumiratana, Rick Crawford, Karl N. Levitt:
How to Sanitize Data. WETICE 2004: 217-222 - [c56]Phillip A. Porras, Linda Briesemeister, Keith Skinner, Karl N. Levitt, Jeff Rowe, Yu-Cheng Allen Ting:
A hybrid quarantine defense. WORM 2004: 73-82 - 2003
- [c55]Tye Stallard, Karl N. Levitt:
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking. ACSAC 2003: 160-167 - [c54]Calvin Ko, Karl N. Levitt:
System Health and Intrusion Monitoring (SHIM): Project Summary. DISCEX (2) 2003: 202-207 - [c53]D. Nojiri, Jeff Rowe, Karl N. Levitt:
Cooperative Response Strategies for Large Scale Attack Mitigation. DISCEX (1) 2003: 293-302 - [c52]Melissa Danforth, Karl N. Levitt:
Immune System Model for Detecting Web Server Attacks. ICMLA 2003: 161-167 - [c51]Marcus Tylutki, Karl N. Levitt:
Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. RAID 2003: 1-16 - [c50]Ivan Balepin, Sergei Maltsev, Jeff Rowe, Karl N. Levitt:
Using Specification-Based Intrusion Detection for Automated Response. RAID 2003: 136-154 - [c49]Chinyang Henry Tseng, Poornima Balasubramanyam, Calvin Ko, Rattapon Limprasittiporn, Jeff Rowe, Karl N. Levitt:
A specification-based intrusion detection system for AODV. SASN 2003: 125-134 - 2002
- [c48]Dustin Lee, Jeff Rowe, Calvin Ko, Karl N. Levitt:
Detecting and Defending against Web-Server Fingerprinting. ACSAC 2002: 321-330 - [c47]Karl N. Levitt:
Intrusion Detection: Current Capabilities and Future Directions. ACSAC 2002: 365-367 - [c46]James C. Reynolds, James E. Just, Ed Lawson, Larry A. Clough, Ryan Maglich, Karl N. Levitt:
The Design and Implementation of an Intrusion Tolerant System. DSN 2002: 285-292 - [c45]James E. Just, James C. Reynolds, Larry A. Clough, Melissa Danforth, Karl N. Levitt, Ryan Maglich, Jeff Rowe:
Learning Unknown Attacks - A Start. RAID 2002: 158-176 - 2001
- [c44]Calvin Ko, Paul Brutch, Jeff Rowe, Guy Tsafnat, Karl N. Levitt:
System Health and Intrusion Monitoring Using a Hierarchy of Constraints. Recent Advances in Intrusion Detection 2001: 190-204 - 2000
- [j21]Richard J. Feiertag, Stuart Staniford-Chen, Karl N. Levitt, Mark R. Heckman, Dave Peticolas, Rick Crawford, Lee A. Benzinger, Sue Rho, Stephen Wu:
Intrusion detection inter-component adaptive negotiation. Comput. Networks 34(4): 605-621 (2000) - [c43]Christina Yip Chung, Michael Gertz, Karl N. Levitt:
Discovery of Multi-Level Security Policies. DBSec 2000: 173-184 - [c42]Steven Cheung, Karl N. Levitt:
A Formal-Specification Based Approach for Protecting the Domain Name System. DSN 2000: 641-651
1990 – 1999
- 1999
- [j20]Cui Zhang, Brian R. Becker, Dave Peticolas, Ronald A. Olsson, Karl N. Levitt:
LVT: A Layered Verification Technique for Distributed Computing Systems. Softw. Test. Verification Reliab. 9(2): 107-133 (1999) - [j19]Cui Zhang, Ronald A. Olsson, Karl N. Levitt:
Formal Verification of a Programming Logic for a Distributed Programming Language. Theor. Comput. Sci. 216(1-2): 213-235 (1999) - [c41]Christina Yip Chung, Michael Gertz, Karl N. Levitt:
Misuse Detection in Database Systems Through User Profiling. Recent Advances in Intrusion Detection 1999 - [c40]Richard J. Feiertag, Stuart Staniford-Chen, Karl N. Levitt, Mark R. Heckman, Dave Peticolas, Rick Crawford, Lee A. Benzinger, Sue Rho, Stephen Wu:
Intrusion Detection Inter-component Adaptive Negotiation. Recent Advances in Intrusion Detection 1999 - [c39]Christina Yip Chung, Michael Gertz, Karl N. Levitt:
DEMIDS: A Misuse Detection System for Database Systems. IICIS 1999: 159-178 - 1998
- [c38]Raymond W. Yip, Karl N. Levitt:
Data Level Inference Detection in Database Systems. CSFW 1998: 179-189 - [c37]Raymond W. Yip, Karl N. Levitt:
The Design and Implementation of a Data Level Database Inference Detection System. DBSec 1998: 253-266 - [c36]Mark R. Heckman, Karl N. Levitt:
Applying the Composition Principle to Verify a Hierarchy of Security Servers. HICSS (3) 1998: 338-347 - [i1]James A. Hoagland, Raju Pandey, Karl N. Levitt:
Security Policy Specification Using a Graphical Approach. CoRR cs.CR/9809124 (1998) - 1997
- [j18]Raymond W. Lo, Karl N. Levitt, Ronald A. Olsson:
Validation of Array Accesses: Integration of Flow Analysis and Program Verification Techniques. Softw. Test. Verification Reliab. 7(4): 201-227 (1997) - [c35]Cui Zhang, Brian R. Becker, Dave Peticolas, Mark R. Heckman, Karl N. Levitt, Ronald A. Olsson:
Verification of a Distributed Computing. HICSS (5) 1997: 252-261 - [c34]Steven Cheung, Karl N. Levitt:
Protecting routing infrastructures from denial of service using cooperative intrusion detection. NSPW 1997: 94-106 - [c33]Calvin Ko, Manfred Ruschitzka, Karl N. Levitt:
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. S&P 1997: 175-187 - 1996
- [c32]Mark R. Heckman, Cui Zhang, Brian R. Becker, Dave Peticolas, Karl N. Levitt, Ronald A. Olsson:
Towards Applying the Composition Principle to Verify a Microkernel Operating System. TPHOLs 1996: 235-250 - [c31]Dan Zerkle, Karl N. Levitt:
NetKuang - A Multi-Host Configuration Vulnerability Checker. USENIX Security Symposium 1996 - 1995
- [j17]Raymond W. Lo, Karl N. Levitt, Ronald A. Olsson:
MCF: a malicious code filter. Comput. Secur. 14(6): 541-566 (1995) - [c30]Cui Zhang, Brian R. Becker, Mark R. Heckman, Karl N. Levitt, Ronald A. Olsson:
A Hierarchical Method for Reasoning about Distributed Programming Languages. TPHOLs 1995: 385-400 - 1994
- [j16]Biswanath Mukherjee, Todd L. Heberlein, Karl N. Levitt:
Network intrusion detection. IEEE Netw. 8(3): 26-41 (1994) - [c29]Calvin Ko, George Fink, Karl N. Levitt:
Automated detection of vulnerabilities in privileged programs by execution monitoring. ACSAC 1994: 134-144 - [c28]George Fink, Karl N. Levitt:
Property-based testing of privileged programs. ACSAC 1994: 154-163 - 1993
- [c27]Calvin Ko, Deborah A. Frincke, Terrance Goan, Todd L. Heberlein, Karl N. Levitt, Biswanath Mukherjee, Christopher Wee:
Analysis of an Algorithm for Distributed Recognition and Accountability. CCS 1993: 154-164 - [c26]Cui Zhang, Robert J. Shaw, Ronald A. Olsson, Karl N. Levitt, Myla Archer, Mark R. Heckman, Gregory D. Benson:
Mechanizing a Programming Logic for the Concurrent Programming Language microSR in HOL. HUG 1993: 29-42 - [c25]Tej Arora, Tony Leung, Karl N. Levitt, E. Thomas Schubert, Phillip J. Windley:
Report on the UCD Microcoded Viper Verification Project. HUG 1993: 239-252 - 1992
- [c24]William L. Harrison, Myla Archer, Karl N. Levitt:
A HOL Mechanisation of the Axiomatic Semantics of a Simple Distributed Programming Language. TPHOLs 1992: 347-356 - [c23]Saraswati Kalvala, Myla Archer, Karl N. Levitt:
Implementation and Use of Annotations in HOL. TPHOLs 1992: 407-426 - [c22]Jing Pan, Karl N. Levitt, Myla Archer, Saraswati Kalvala:
Towards a Formal Verification of a Floating Point Coprocessor and its Composition with a Central Processing Unit. TPHOLs 1992: 427-447 - [e1]Myla Archer, Jeffrey J. Joyce, Karl N. Levitt, Phillip J. Windley:
Proceedings of the 1991 International Workshop on the HOL Theorem Proving System and its Applications, August 1991, Davis, California, USA. IEEE Computer Society 1992 [contents] - 1991
- [c21]Raymond W. Lo, P. Kerchen, Richard H. Crawford, W. Wilson Ho, J. Crossley, George Fink, Karl N. Levitt, Ronald A. Olsson, Myla Archer:
Towards a testbed for malicious code detection. Compcon 1991: 160-166 - [c20]Steven R. Snapp, James Brentano, Gihan V. Dias, Terrance Goan, Tim Grance, Todd L. Heberlein, Che-Lin Ho, Karl N. Levitt, Biswanath Mukherjee, Douglass L. Mansur, Kenneth L. Pon, Stephen E. Smaha:
A system for distributed intrusion detection. Compcon 1991: 170-176 - [c19]Jim Alves-Foss, Karl N. Levitt:
The verification of secure distributed systems. Compcon 1991: 177-184 - [c18]Deborah A. Frincke, Myla Archer, Karl N. Levitt:
CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms. KBSE 1991: 151-160 - [c17]Myla Archer, James Bock, Deborah A. Frincke, Karl N. Levitt:
Effectiveness of operating system prototyping from a template: application to MINIX. RSP 1991: 55-66 - [c16]Deborah A. Frincke, Genc L. Fisher, Myla Archer, Karl N. Levitt:
An application of template methodology: rapid prototyping of user interface management systems. RSP 1991: 82-98 - [c15]Jim Alves-Foss, Karl N. Levitt:
Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components. S&P 1991: 122-135 - [c14]William L. Harrison, Karl N. Levitt:
Mechanizing Security in HOL. TPHOLs 1991: 63-66 - [c13]Jim Alves-Foss, Karl N. Levitt:
Mechanical Verification of Secure Distributed Systems in Higher Order Logic. TPHOLs 1991: 263-278 - 1990
- [c12]Myla Archer, Deborah A. Frincke, Karl N. Levitt:
A template for rapid prototyping of operating systems. RSP 1990: 119-127 - [c11]L. Todd Herberlein, Gihan V. Dias, Karl N. Levitt, Biswanath Mukherjee, Jeff Wood, David Wolber:
A Network Security Monitor. S&P 1990: 296-305
1980 – 1989
- 1985
- [j15]Karl N. Levitt, R. Alan Whitehurst:
Overview of applications. ACM SIGSOFT Softw. Eng. Notes 10(4): 95-96 (1985) - 1981
- [j14]Karl N. Levitt, Peter G. Neumann:
Recent SRI work in verification. ACM SIGSOFT Softw. Eng. Notes 6(3): 27-35 (1981)
1970 – 1979
- 1979
- [c10]Karl N. Levitt, Lawrence Robinson, Brad A. Silverberg:
Writing Simulatable Specifications in SPECIAL. The Use of Formal Specification of Software 1979: 39-78 - 1978
- [j13]Jay M. Spitzen, Karl N. Levitt, Lawrence Robinson:
An Example of Hierarchical Design and Proof. Commun. ACM 21(12): 1064-1075 (1978) - 1977
- [j12]Lawrence Robinson, Karl N. Levitt:
Proof Techniques for Hierarchically Structured Programs. Commun. ACM 20(4): 271-283 (1977) - [c9]Richard J. Feiertag, Karl N. Levitt, Lawrence Robinson:
Proving Multilevel Security of a System Design. SOSP 1977: 57-65 - 1976
- [c8]Peter G. Neumann, Richard J. Feiertag, Karl N. Levitt, Lawrence Robinson:
Software Development and Proofs of Multi-Level Security. ICSE 1976: 421-428 - [c7]John H. Wensley, Milton W. Green, Karl N. Levitt, Robert E. Shostak:
The Design, Analysis, and Verification of the SIFT Fault-Tolerant System. ICSE 1976: 458-469 - 1975
- [c6]Robert S. Boyer, Bernard Elspas, Karl N. Levitt:
SELECT - a formal system for testing and debugging programs by symbolic execution. Reliable Software 1975: 234-245 - [c5]Lawrence Robinson, Karl N. Levitt, Peter G. Neumann, Ashok R. Saxena:
On attaining reliable software for a secure operating system. Reliable Software 1975: 267-284 - 1974
- [j11]Richard J. Waldinger, Karl N. Levitt:
Reasoning about Programs. Artif. Intell. 5(3): 235-316 (1974) - [j10]Jack Goldberg, Karl N. Levitt, John H. Wensley:
An Organization for a Highly Survivable Memory. IEEE Trans. Computers 23(7): 693-705 (1974) - 1973
- [c4]Richard J. Waldinger, Karl N. Levitt:
Reasoning About Programs. POPL 1973: 169-182 - [c3]Karl N. Levitt:
Report of evening session on hierarchical methods. SIGPLAN-SIGOPS Interface Meeting 1973: 28-29 - 1972
- [j9]Karl N. Levitt, William H. Kautz:
Cellular Arrays for the Solution of Graph Problems. Commun. ACM 15(9): 789-801 (1972) - [j8]Bernard Elspas, Karl N. Levitt, Richard J. Waldinger, Abraham Waksman:
An Assessment of Techniques for Proving Program Correctness. ACM Comput. Surv. 4(2): 97-147 (1972) - [c2]Karl N. Levitt:
The application of program-proving techniques to the verification of synchronization processes. AFIPS Fall Joint Computing Conference (1) 1972: 33-47 - 1971
- [j7]Bernard Elspas, Milton W. Green, Karl N. Levitt:
Software Reliability. Computer 4(1): 21-27 (1971) - 1970
- [j6]Karl N. Levitt:
R70-38 The Time Required for Group Multiplication. IEEE Trans. Computers 19(9): 859-860 (1970)
1960 – 1969
- 1969
- [j5]Eugene L. Lawler, Karl N. Levitt, James Turner:
Module Clustering to Minimize Delay in Digital Networks. IEEE Trans. Computers 18(1): 47-57 (1969) - [j4]William H. Kautz, Karl N. Levitt:
A survey of progress in coding theory in the Soviet Union. IEEE Trans. Inf. Theory 15(1): 197-244 (1969) - [j3]Karl N. Levitt, William H. Kautz:
Cellular arrays for the parallel implementation of binary error-correcting codes. IEEE Trans. Inf. Theory 15(5): 597-607 (1969) - 1968
- [j2]William H. Kautz, Karl N. Levitt, Abraham Waksman:
Cellular Interconnection Arrays. IEEE Trans. Computers 17(5): 443-451 (1968) - [c1]Karl N. Levitt, Milton W. Green, Jack Goldberg:
A study of the data commutation problems in a self-repairable multiprocessor. AFIPS Spring Joint Computing Conference 1968: 515-527 - 1967
- [j1]Karl N. Levitt, Jack K. Wolf:
A class of nonlinear error correcting codes based upon interleaved two-level sequences (Corresp.). IEEE Trans. Inf. Theory 13(2): 335-336 (1967)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint