John McHugh
John McHugh
Adjunct Professor of Computer Science, University of North Carolina
Verified email at cs.unc.edu
Title
Cited by
Cited by
Year
Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
J McHugh
ACM Transactions on Information and System Security (TISSEC) 3 (4), 262-294, 2000
15412000
State of the practice of intrusion detection technologies
J Allen, A Christie, W Fithen, J McHugh, J Pickel
CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST, 2000
6792000
Windows of vulnerability: A case study analysis
WA Arbaugh, WL Fithen, J McHugh
Computer 33 (12), 52-59, 2000
3932000
Defending yourself: The role of intrusion detection systems
J McHugh, A Christie, J Allen
IEEE software 17 (5), 42-51, 2000
3772000
Intrusion and intrusion detection
J McHugh
International Journal of Information Security 1 (1), 14-35, 2001
3242001
A cautionary note on image downgrading.
CW Kurak Jr, J McHugh
ACSAC, 153-159, 1992
2661992
Survivable network analysis method
NR Mead, RJ Ellison, RC Linger, T Longstaff, J McHugh
CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST, 2000
1782000
A trend analysis of exploitations
HK Browne, WA Arbaugh, J McHugh, WL Fithen
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 214-229, 2000
1522000
The 1998 lincoln laboratory ids evaluation
J McHugh
International Workshop on Recent Advances in Intrusion Detection, 145-161, 2000
1342000
An experience using two covert channel analysis techniques on a real system design
JT Haigh, RA Kemmerer, J McHugh, WD Young
IEEE Transactions on Software Engineering, 157-168, 1987
901987
Flovis: Flow visualization system
T Taylor, D Paterson, J Glanfield, C Gates, S Brooks, J McHugh
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
822009
Sybil attacks as a mitigation strategy against the storm botnet
CR Davis, JM Fernandez, S Neville, J McHugh
2008 3rd International Conference on Malicious and Unwanted Software …, 2008
822008
Hiding intrusions: From the abnormal to the normal and beyond
K Tan, J McHugh, K Killourhy
International Workshop on Information Hiding, 1-17, 2002
792002
Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?
CR Davis, S Neville, JM Fernandez, JM Robert, J McHugh
European Symposium on Research in Computer Security, 461-480, 2008
632008
A human capital model for mitigating security analyst burnout
SC Sundaramurthy, AG Bardas, J Case, X Ou, M Wesch, J McHugh, ...
Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015), 347-359, 2015
552015
Quality of protection: measuring the unmeasurable?
J McHugh
Proceedings of the 2nd ACM workshop on Quality of protection, 1-2, 2006
472006
Business representation in the UK since 1979: The case of trade associations
TC May, J McHugh, T Taylor
Political Studies 46 (2), 260-275, 1998
471998
Covert channel analysis
J McHugh, M John
441995
Turning contradictions into innovations or: How we learned to stop whining and improve security operations
SC Sundaramurthy, J McHugh, X Ou, M Wesch, AG Bardas, ...
Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), 237-251, 2016
432016
Toward a cost model for system administration
A Couch, N Wu, H Susanto
Proceedings of the Nineteenth System Administration Conference (LISA XIX), 4-9, 2005
422005
The system can't perform the operation now. Try again later.
Articles 1–20