Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation RP Lippmann, DJ Fried, I Graf, JW Haines, KR Kendall, D McClung, ... Proceedings DARPA Information survivability conference and exposition …, 2000 | 1418 | 2000 |
A taxonomy of computer worms N Weaver, V Paxson, S Staniford, R Cunningham Proceedings of the 2003 ACM workshop on Rapid Malcode, 11-18, 2003 | 764 | 2003 |
Technique for detecting executable malicious code using a combination of static and dynamic analyses R Khazan, J Rabek, S Lewandowski, R Cunningham US Patent App. 10/464,828, 2005 | 532 | 2005 |
Fusing a heterogeneous alert stream into scenarios O Dain, RK Cunningham Applications of Data Mining in Computer Security 6, 103-122, 2002 | 416 | 2002 |
Improving intrusion detection performance using keyword selection and neural networks RP Lippmann, RK Cunningham Computer networks 34 (4), 597-603, 2000 | 397 | 2000 |
Validating and restoring defense in depth using attack graphs R Lippmann, K Ingols, C Scott, K Piwowarski, K Kratkiewicz, M Artz, ... MILCOM 2006-2006 IEEE military communications conference, 1-10, 2006 | 309 | 2006 |
The real cost of software errors M Zhivich, RK Cunningham IEEE Security & Privacy 7 (2), 87-90, 2009 | 186 | 2009 |
Gnuplot 4.5: an interactive plotting program. 2011 T Williams, C Kelley, HB Bröker, J Campbell, R Cunningham, D Denholm, ... URL http://www. gnuplot. info 56, 2017 | 164 | 2017 |
Why measuring security is hard S Pfleeger, R Cunningham IEEE Security & Privacy 8 (4), 46-54, 2010 | 163 | 2010 |
Sok: Cryptographically protected database search B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ... 2017 IEEE Symposium on Security and Privacy (SP), 172-191, 2017 | 159 | 2017 |
Detection of injected, dynamically generated, and obfuscated malicious code JC Rabek, RI Khazan, SM Lewandowski, RK Cunningham Proceedings of the 2003 ACM workshop on Rapid malcode, 76-82, 2003 | 154 | 2003 |
LARIAT: Lincoln adaptable real-time information assurance testbed LM Rossey, RK Cunningham, DJ Fried, JC Rabek, RP Lippmann, ... Proceedings, ieee aerospace conference 6, 6-6, 2002 | 149 | 2002 |
Building scenarios from a heterogeneous alert stream OM Dain, RK Cunningham Proceedings of the 2001 IEEE workshop on Information Assurance and Security 235, 2001 | 146 | 2001 |
Evaluating and strengthening enterprise network security using attack graphs RP Lippmann, KW Ingols, C Scott, K Piwowarski, K Kratkiewicz, M Artz, ... Project Report IA-2, MIT Lincoln Laboratory, 2005 | 133 | 2005 |
Extending the darpa off-line intrusion detection evaluations JW Haines, LM Rossey, RP Lippmann, RK Cunningham Proceedings DARPA Information Survivability Conference and Exposition II …, 2001 | 117 | 2001 |
Computing on masked data: a high performance method for improving big data veracity J Kepner, V Gadepally, P Michaleas, N Schear, M Varia, A Yerukhimovich, ... 2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014 | 112 | 2014 |
Evaluating intrusion detection systems without attacking your friends: The 1998 DARPA intrusion detection evaluation RK Cunningham, RP Lippmann, DJ Fried, SL Garfinkel, I Graf, KR Kendall, ... Proceedings of ID 99, 1999 | 111 | 1999 |
Neural processing of targets in visible, multispectral IR and SAR imagery AM Waxman, MC Seibert, A Gove, DA Fay, AM Bernardon, C Lazott, ... Neural Networks 8 (7-8), 1029-1051, 1995 | 95 | 1995 |
gnuplot 4.6 T Williams, C Kelley, HB Bröker, J Campbell, R Cunningham, D Denholm, ... An Interactive Plotting Program, 2012 | 70 | 2012 |
Blockchain technology: what is it good for? S Ruoti, B Kaiser, A Yerukhimovich, J Clark, R Cunningham Communications of the ACM 63 (1), 46-53, 2019 | 62 | 2019 |