עקוב אחר
John McHugh
John McHugh
Adjunct Professor of Computer Science, University of North Carolina
כתובת אימייל מאומתת בדומיין cs.unc.edu
כותרת
צוטט על ידי
צוטט על ידי
שנה
Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
J McHugh
ACM Transactions on Information and System Security (TISSEC) 3 (4), 262-294, 2000
18622000
State of the practice of intrusion detection technologies
J Allen, A Christie, W Fithen, J McHugh, J Pickel
(No Title), 2000
7152000
Windows of vulnerability: A case study analysis
WA Arbaugh, WL Fithen, J McHugh
Computer 33 (12), 52-59, 2000
4392000
Defending yourself: The role of intrusion detection systems
J McHugh, A Christie, J Allen
IEEE software 17 (5), 42-51, 2000
4132000
Intrusion and intrusion detection
J McHugh
International Journal of Information Security 1, 14-35, 2001
3442001
A cautionary note on image downgrading.
CW Kurak Jr, J McHugh
ACSAC, 153-159, 1992
3091992
Survivable network analysis method
NR Mead, RJ Ellison, RC Linger, T Longstaff, J McHugh
CMU/SEI, 2000
1672000
A trend analysis of exploitations
HK Browne, WA Arbaugh, J McHugh, WL Fithen
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 214-229, 2000
1572000
The 1998 Lincoln laboratory IDS evaluation: a critique
J McHugh
Recent Advances in Intrusion Detection: Third International Workshop, RAID …, 2000
1452000
A human capital model for mitigating security analyst burnout
SC Sundaramurthy, AG Bardas, J Case, X Ou, M Wesch, J McHugh, ...
Eleventh symposium on usable privacy and security (SOUPS 2015), 347-359, 2015
1112015
An experience using two covert channel analysis techniques on a real system design
JT Haigh, RA Kemmerer, J McHugh, WD Young
IEEE Transactions on Software Engineering, 157-168, 1987
941987
Sybil attacks as a mitigation strategy against the storm botnet
CR Davis, JM Fernandez, S Neville, J McHugh
2008 3rd International Conference on Malicious and Unwanted Software …, 2008
912008
Hiding intrusions: From the abnormal to the normal and beyond
K Tan, J McHugh, K Killourhy
Information Hiding: 5th International Workshop, IH 2002 Noordwijkerhout, The …, 2003
882003
Flovis: Flow visualization system
T Taylor, D Paterson, J Glanfield, C Gates, S Brooks, J McHugh
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
852009
Turning contradictions into innovations or: How we learned to stop whining and improve security operations
SC Sundaramurthy, J McHugh, X Ou, M Wesch, AG Bardas, ...
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 237-251, 2016
842016
Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?
CR Davis, S Neville, JM Fernandez, JM Robert, J McHugh
Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008
652008
Quality of protection: Measuring the unmeasurable?
J McHugh
Proceedings of the 2nd ACM workshop on Quality of protection, 1-2, 2006
542006
Business representation in the UK since 1979: the case of trade associations
TC May, J McHugh, T Taylor
Political Studies 46 (2), 260-275, 1998
531998
An anthropological approach to studying CSIRTs
SC Sundaramurthy, J McHugh, XS Ou, SR Rajagopalan, M Wesch
IEEE Security & Privacy 12 (5), 52-60, 2014
502014
Life-cycle models for survivable systems
RC Linger, HF Lipson, J McHugh, NR Mead, CA Sledge
CMU Software Engineering Institute, CMU/SEI-2002-TR-026, 2002
462002
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20