Login / Signup
Calvin Ko
Publication Activity (10 Years)
Years Active: 1993-2010
Publications (10 Years): 0
</>
Publications
</>
Songjie Wei
,
Alefiya Hussain
,
Jelena Mirkovic
,
Calvin Ko
Tools for worm experimentation on the DETER testbed.
Int. J. Commun. Networks Distributed Syst.
5 (1/2) (2010)
Songjie Wei
,
Calvin Ko
,
Jelena Mirkovic
,
Alefiya Hussain
Tools for worm experimentation on the DETER testbed.
TRIDENTCOM
(2009)
Brett Wilson
,
Calvin Ko
,
Alefiya Hussain
SEER: A Security Experimentation EnviRonment for DETER.
DETER
(2007)
Chinyang Henry Tseng
,
Shiau-Huey Wang
,
Calvin Ko
,
Karl N. Levitt
DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET.
RAID
(2006)
Jelena Mirkovic
,
Peter L. Reiher
,
Sonia Fahmy
,
Roshan K. Thomas
,
Alefiya Hussain
,
Stephen Schwab
,
Calvin Ko
Measuring denial Of service.
QoP
(2006)
Tao Song
,
Calvin Ko
,
Chinyang Henry Tseng
,
Poornima Balasubramanyam
,
Anant Chaudhary
,
Karl N. Levitt
Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks.
Formal Aspects in Security and Trust
(2005)
Daniel F. Sterne
,
Poornima Balasubramanyam
,
David Carman
,
Brett Wilson
,
Rajesh Talpade
,
Calvin Ko
,
Ravindra Balupari
,
Chin-Yang Tseng
,
Thomas F. Bowen
,
Karl N. Levitt
,
Jeff Rowe
A General Cooperative Intrusion Detection Architecture for MANETs.
IWIA
(2005)
Chinyang Henry Tseng
,
Tao Song
,
Poornima Balasubramanyam
,
Calvin Ko
,
Karl N. Levitt
A Specification-Based Intrusion Detection Model for OLSR.
RAID
(2005)
Tao Song
,
Calvin Ko
,
Jim Alves-Foss
,
Cui Zhang
,
Karl N. Levitt
Formal Reasoning About Intrusion Detection Systems.
RAID
(2004)
Calvin Ko
System Health and Intrusion Monitoring: Technology Description.
DISCEX (2)
(2003)
Calvin Ko
,
Karl N. Levitt
System Health and Intrusion Monitoring (SHIM): Project Summary.
DISCEX (2)
(2003)
Chin-Yang Tseng
,
Poornima Balasubramanyam
,
Calvin Ko
,
Rattapon Limprasittiporn
,
Jeff Rowe
,
Karl N. Levitt
A specification-based intrusion detection system for AODV.
SASN
(2003)
Paul Brutch
,
Calvin Ko
Challenges in Intrusion Detection for Wireless Ad-hoc Networks.
SAINT Workshops
(2003)
Dustin Lee
,
Jeff Rowe
,
Calvin Ko
,
Karl N. Levitt
Detecting and Defending against Web-Server Fingerprinting.
ACSAC
(2002)
Calvin Ko
,
Timothy Redmond
Noninterference and Intrusion Detection.
IEEE Symposium on Security and Privacy
(2002)
Calvin Ko
,
Paul Brutch
,
Jeff Rowe
,
Guy Tsafnat
,
Karl N. Levitt
System Health and Intrusion Monitoring Using a Hierarchy of Constraints.
Recent Advances in Intrusion Detection
(2001)
Calvin Ko
Logic Induction of Valid Behavior Specifications for Intrusion Detection.
IEEE Symposium on Security and Privacy
(2000)
Calvin Ko
,
Timothy Fraser
,
Lee Badger
,
Douglas Kilpatrickv
Detecting and Countering System Intrusions Using Software Wrappers.
USENIX Security Symposium
(2000)
Calvin Ko
,
Manfred Ruschitzka
,
Karl N. Levitt
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach.
IEEE Symposium on Security and Privacy
(1997)
Calvin Ko
,
George Fink
,
Karl N. Levitt
Automated detection of vulnerabilities in privileged programs by execution monitoring.
ACSAC
(1994)
Calvin Ko
,
Deborah A. Frincke
,
Terrance Goan
,
Todd L. Heberlein
,
Karl N. Levitt
,
Biswanath Mukherjee
,
Christopher Wee
Analysis of an Algorithm for Distributed Recognition and Accountability.
CCS
(1993)