A sense of self for unix processes S Forrest, SA Hofmeyr, A Somayaji, TA Longstaff Proceedings 1996 IEEE Symposium on Security and Privacy, 120-128, 1996 | 3067 | 1996 |
Intrusion detection using sequences of system calls SA Hofmeyr, S Forrest, A Somayaji Journal of computer security 6 (3), 151-180, 1998 | 2172 | 1998 |
Computer immunology S Forrest, SA Hofmeyr, A Somayaji Communications of the ACM 40 (10), 88-96, 1997 | 1276 | 1997 |
Building diverse computer systems S Forrest, A Somayaji, DH Ackley Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No …, 1997 | 759 | 1997 |
A methodology for empirical analysis of permission-based security models and its application to android D Barrera, HG Kayacik, PC van Oorschot, A Somayaji Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 725 | 2010 |
Principles of a computer immune system A Somayaji, S Hofmeyr, S Forrest Proceedings of the 1997 workshop on New security paradigms, 75-82, 1998 | 545 | 1998 |
Automated Response Using System-Call Delay. A Somayaji, S Forrest Usenix Security Symposium, 185-197, 2000 | 417 | 2000 |
Pass-thoughts: authenticating with our minds J Thorpe, PC Van Oorschot, A Somayaji Proceedings of the 2005 workshop on New security paradigms, 45-56, 2005 | 259 | 2005 |
The evolution of system-call monitoring S Forrest, S Hofmeyr, A Somayaji 2008 annual computer security applications conference (acsac), 418-430, 2008 | 186 | 2008 |
A generic attack on checksumming-based software tamper resistance G Wurster, PC Van Oorschot, A Somayaji 2005 IEEE Symposium on Security and Privacy (S&P'05), 127-138, 2005 | 156 | 2005 |
Operating system stability and security through process homeostasis AB Somayaji University of New Mexico, 2002 | 138 | 2002 |
Learning DFA representations of HTTP for protecting web applications KL Ingham, A Somayaji, J Burge, S Forrest Computer Networks 51 (5), 1239-1255, 2007 | 135 | 2007 |
A clinical study of risk factors related to malware infections F Lalonde Levesque, J Nsiempba, JM Fernandez, S Chiasson, ... Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 113 | 2013 |
Hardware-assisted circumvention of self-hashing software tamper resistance PC Van Oorschot, A Somayaji, G Wurster IEEE Transactions on Dependable and Secure Computing 2 (2), 82-92, 2005 | 112 | 2005 |
Analysis of the 1999 darpa/lincoln laboratory ids evaluation data with netadhict C Brown, A Cowperthwaite, A Hijazi, A Somayaji 2009 IEEE Symposium on Computational Intelligence for Security and Defense …, 2009 | 108 | 2009 |
SOMA: Mutual approval for included content in web pages T Oda, G Wurster, PC van Oorschot, A Somayaji Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 95 | 2008 |
System and method for implicit authentication DC Dutt, AB Somayaji, MJK Bingham US Patent 9,788,203, 2017 | 64 | 2017 |
Context-dependent authentication system, method and device DC Dutt, AB Somayaji US Patent 9,619,852, 2017 | 63 | 2017 |
Software diversity: security, entropy and game theory S Neti, A Somayaji, ME Locasto 7th USENIX HotSec, 2012 | 42 | 2012 |
Cloud Security: Attacks and Current Defenses G Booth, A Soknacki, A Somayaji 8th Annual Symposium on Information Assurance (ASIA’13), 56, 2013 | 41 | 2013 |