Follow
Anil Somayaji
Anil Somayaji
Associate Professor, School of Computer Science, Carleton University
Verified email at scs.carleton.ca
Title
Cited by
Cited by
Year
A sense of self for unix processes
S Forrest, SA Hofmeyr, A Somayaji, TA Longstaff
Proceedings 1996 IEEE Symposium on Security and Privacy, 120-128, 1996
30141996
Intrusion detection using sequences of system calls
SA Hofmeyr, S Forrest, A Somayaji
Journal of computer security 6 (3), 151-180, 1998
21101998
Computer immunology
S Forrest, SA Hofmeyr, A Somayaji
Communications of the ACM 40 (10), 88-96, 1997
12601997
Building diverse computer systems
S Forrest, A Somayaji, DH Ackley
Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No …, 1997
7351997
A methodology for empirical analysis of permission-based security models and its application to android
D Barrera, HG Kayacik, PC van Oorschot, A Somayaji
Proceedings of the 17th ACM conference on Computer and communications …, 2010
7082010
Principles of a computer immune system
A Somayaji, S Hofmeyr, S Forrest
Proceedings of the 1997 workshop on New security paradigms, 75-82, 1998
5281998
Automated Response Using System-Call Delay.
A Somayaji, S Forrest
Usenix Security Symposium, 185-197, 2000
4042000
Pass-thoughts: authenticating with our minds
J Thorpe, PC Van Oorschot, A Somayaji
Proceedings of the 2005 workshop on New security paradigms, 45-56, 2005
2472005
The evolution of system-call monitoring
S Forrest, S Hofmeyr, A Somayaji
2008 annual computer security applications conference (acsac), 418-430, 2008
1772008
A generic attack on checksumming-based software tamper resistance
G Wurster, PC Van Oorschot, A Somayaji
2005 IEEE Symposium on Security and Privacy (S&P'05), 127-138, 2005
1552005
Learning DFA representations of HTTP for protecting web applications
KL Ingham, A Somayaji, J Burge, S Forrest
Computer Networks 51 (5), 1239-1255, 2007
1352007
Operating system stability and security through process homeostasis
AB Somayaji
University of New Mexico, 2002
1352002
Hardware-assisted circumvention of self-hashing software tamper resistance
PC Van Oorschot, A Somayaji, G Wurster
IEEE Transactions on Dependable and Secure Computing 2 (2), 82-92, 2005
1062005
A clinical study of risk factors related to malware infections
F Lalonde Levesque, J Nsiempba, JM Fernandez, S Chiasson, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1012013
SOMA: Mutual approval for included content in web pages
T Oda, G Wurster, PC van Oorschot, A Somayaji
Proceedings of the 15th ACM conference on Computer and communications …, 2008
942008
Analysis of the 1999 darpa/lincoln laboratory ids evaluation data with netadhict
C Brown, A Cowperthwaite, A Hijazi, A Somayaji
2009 IEEE Symposium on Computational Intelligence for Security and Defense …, 2009
902009
Context-dependent authentication system, method and device
DC Dutt, AB Somayaji
US Patent 9,619,852, 2017
482017
Cloud Security: Attacks and Current Defenses
G Booth, A Soknacki, A Somayaji
8th Annual Symposium on Information Assurance (ASIA’13), 56, 2013
402013
Software diversity: security, entropy and game theory
S Neti, A Somayaji, ME Locasto
7th USENIX HotSec, 2012
402012
System and method for implicit authentication
DC Dutt, AB Somayaji, MJK Bingham
US Patent 9,788,203, 2017
392017
The system can't perform the operation now. Try again later.
Articles 1–20