Anil Somayaji
Anil Somayaji
Associate Professor, School of Computer Science, Carleton University
Verified email at scs.carleton.ca
TitleCited byYear
A sense of self for unix processes
S Forrest, SA Hofmeyr, A Somayaji, TA Longstaff
Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on, 120-128, 1996
25971996
Intrusion detection using sequences of system calls
SA Hofmeyr, S Forrest, A Somayaji
Journal of computer security 6 (3), 151-180, 1998
18241998
Computer immunology
S Forrest, SA Hofmeyr, A Somayaji
Communications of the ACM 40 (10), 88-96, 1997
11591997
Building diverse computer systems
S Forrest, A Somayaji, DH Ackley
Operating Systems, 1997., The Sixth Workshop on Hot Topics in, 67-72, 1997
6221997
A methodology for empirical analysis of permission-based security models and its application to android
D Barrera, HG Kayacik, PC van Oorschot, A Somayaji
Proceedings of the 17th ACM conference on Computer and communications …, 2010
5642010
Principles of a computer immune system
A Somayaji, S Hofmeyr, S Forrest
Proceedings of the 1997 workshop on New security paradigms, 75-82, 1998
4791998
Automated Response Using System-Call Delay.
A Somayaji, S Forrest
Usenix Security Symposium, 185-197, 2000
3632000
Pass-thoughts: authenticating with our minds
J Thorpe, PC Van Oorschot, A Somayaji
Proceedings of the 2005 workshop on New security paradigms, 45-56, 2005
1962005
The evolution of system-call monitoring
S Forrest, S Hofmeyr, A Somayaji
Computer Security Applications Conference, 2008. ACSAC 2008. Annual, 418-430, 2008
1372008
A generic attack on checksumming-based software tamper resistance
G Wurster, PC van Oorschot, A Somayaji
Security and Privacy, 2005 IEEE Symposium on, 127-138, 2005
1212005
Operating system stability and security through process homeostasis
AB Somayaji
University of New Mexico, 2002
1212002
Learning DFA representations of HTTP for protecting web applications
KL Ingham, A Somayaji, J Burge, S Forrest
Computer Networks 51 (5), 1239-1255, 2007
1192007
Hardware-assisted circumvention of self-hashing software tamper resistance
PC Van Oorschot, A Somayaji, G Wurster
IEEE Transactions on Dependable and Secure Computing 2 (2), 82-92, 2005
952005
SOMA: Mutual approval for included content in web pages
T Oda, G Wurster, PC van Oorschot, A Somayaji
Proceedings of the 15th ACM conference on Computer and communications …, 2008
822008
A clinical study of risk factors related to malware infections
F Lalonde Levesque, J Nsiempba, JM Fernandez, S Chiasson, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
632013
Analysis of the 1999 darpa/lincoln laboratory ids evaluation data with netadhict
C Brown, A Cowperthwaite, A Hijazi, A Somayaji
Computational Intelligence for Security and Defense Applications, 2009 …, 2009
462009
Mitigating network denial-of-service through diversity-based traffic management
A Matrawy, P van Oorschot, A Somayaji
Applied Cryptography and Network Security, 443-471, 2005
292005
Cloud Security: Attacks and Current Defenses
G Booth, A Soknacki, A Somayaji
8th Annual Symposium on Information Assurance (ASIA’13), 56, 2013
272013
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet
J Calvet, CR Davis, JM Fernandez, JY Marion, PL St-Onge, W Guizani, ...
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
262010
The future of biologically-inspired security: is there anything left to learn?
A Somayaji, M Locasto, J Feyereisl
Proceedings of the 2007 Workshop on New Security Paradigms, 49-54, 2008
252008
The system can't perform the operation now. Try again later.
Articles 1–20