Anil Somayaji
Anil Somayaji
Associate Professor, School of Computer Science, Carleton University
Verified email at scs.carleton.ca
Title
Cited by
Cited by
Year
A sense of self for unix processes
S Forrest, SA Hofmeyr, A Somayaji, TA Longstaff
Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on, 120-128, 1996
27311996
Intrusion detection using sequences of system calls
SA Hofmeyr, S Forrest, A Somayaji
Journal of computer security 6 (3), 151-180, 1998
19341998
Computer immunology
S Forrest, SA Hofmeyr, A Somayaji
Communications of the ACM 40 (10), 88-96, 1997
11991997
Building diverse computer systems
S Forrest, A Somayaji, DH Ackley
Operating Systems, 1997., The Sixth Workshop on Hot Topics in, 67-72, 1997
6641997
A methodology for empirical analysis of permission-based security models and its application to android
D Barrera, HG Kayacik, PC van Oorschot, A Somayaji
Proceedings of the 17th ACM conference on Computer and communications …, 2010
6222010
Principles of a computer immune system
A Somayaji, S Hofmeyr, S Forrest
Proceedings of the 1997 workshop on New security paradigms, 75-82, 1998
5081998
Automated Response Using System-Call Delay.
A Somayaji, S Forrest
Usenix Security Symposium, 185-197, 2000
3842000
Pass-thoughts: authenticating with our minds
J Thorpe, PC Van Oorschot, A Somayaji
Proceedings of the 2005 workshop on New security paradigms, 45-56, 2005
2132005
The evolution of system-call monitoring
S Forrest, S Hofmeyr, A Somayaji
Computer Security Applications Conference, 2008. ACSAC 2008. Annual, 418-430, 2008
1542008
A generic attack on checksumming-based software tamper resistance
G Wurster, PC van Oorschot, A Somayaji
Security and Privacy, 2005 IEEE Symposium on, 127-138, 2005
1282005
Operating system stability and security through process homeostasis
AB Somayaji
University of New Mexico, 2002
1282002
Learning DFA representations of HTTP for protecting web applications
KL Ingham, A Somayaji, J Burge, S Forrest
Computer Networks 51 (5), 1239-1255, 2007
1262007
Hardware-assisted circumvention of self-hashing software tamper resistance
PC Van Oorschot, A Somayaji, G Wurster
IEEE Transactions on Dependable and Secure Computing 2 (2), 82-92, 2005
1002005
SOMA: Mutual approval for included content in web pages
T Oda, G Wurster, PC van Oorschot, A Somayaji
Proceedings of the 15th ACM conference on Computer and communications …, 2008
862008
A clinical study of risk factors related to malware infections
F Lalonde Levesque, J Nsiempba, JM Fernandez, S Chiasson, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
782013
Analysis of the 1999 darpa/lincoln laboratory ids evaluation data with netadhict
C Brown, A Cowperthwaite, A Hijazi, A Somayaji
Computational Intelligence for Security and Defense Applications, 2009 …, 2009
722009
Cloud Security: Attacks and Current Defenses
G Booth, A Soknacki, A Somayaji
8th Annual Symposium on Information Assurance (ASIA’13), 56, 2013
352013
Mitigating network denial-of-service through diversity-based traffic management
A Matrawy, P van Oorschot, A Somayaji
Applied Cryptography and Network Security, 443-471, 2005
322005
The future of biologically-inspired security: is there anything left to learn?
A Somayaji, M Locasto, J Feyereisl
Proceedings of the 2007 Workshop on New Security Paradigms, 49-54, 2008
282008
Understanding Data Leak Prevention
P Raman, HG Kayacık, A Somayaji
6th Annual Symposium on Information Assurance (ASIA’11), 27, 2011
272011
The system can't perform the operation now. Try again later.
Articles 1–20