Name
Affiliation
Papers
ANIL SOMAYAJI
Univ. of New Mexico, Albuquerque
39
Collaborators
Citations 
PageRank 
55
1842
217.22
Referers 
Referees 
References 
4025
839
468
Search Limit
1001000
Title
Citations
PageRank
Year
bpfbox: Simple Precise Process Confinement with eBPF00.342020
Towards In-Band Non-Cryptographic Authentication.00.342020
After the BlockCLoud Apocalypse00.342018
Learning over subconcepts: Strategies for 1-class classification.00.342018
Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach.10.362018
Can I believe you?: Establishing Trust in Computer Mediated Introductions.00.342017
Measuring the health of antivirus ecosystems.00.342015
Risk prediction of malware victimization based on user behavior00.342014
A clinical study of risk factors related to malware infections261.332013
Towards narrative authentication: or, against boring authentication30.402013
Software diversity: security, entropy and game theory50.742012
Methodology for a field study of anti-malware software30.482012
Customer Appeasement Scheduling00.342010
A methodology for empirical analysis of permission-based security models and its application to android22115.322010
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet90.722010
Object-level recombination of commodity applications40.392010
Visual security policy for the web00.342010
Analysis of the 1999 DARPA/Lincoln Laboratory IDS evaluation data with NetADHICT.100.922009
Evaluating security products with clinical trials50.902009
The Evolution of System-Call Monitoring441.552008
SOMA: mutual approval for included content in web pages332.392008
NetADHICT: a tool for understanding network traffic70.612007
Learning DFA representations of HTTP for protecting web applications461.802007
Immunology, diversity, and homeostasis: The past and future of biologically inspired computer defenses20.372007
The future of biologically-inspired security: is there anything left to learn?50.902007
A methodology for designing accurate anomaly detection systems00.342007
Securing email archives through user modeling10.372005
Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance412.552005
A generic attack on checksumming-based software tamper resistance553.712005
Towards Network Awareness40.942005
Mitigating network denial-of-service through diversity-based traffic management120.802005
Highlights from the 2005 New Security Paradigms Workshop00.342005
Pass-thoughts: authenticating with our minds472.592005
How to win an evolutionary arms race60.782004
Automated response using system-call delays11315.812000
Intrusion detection using sequences of system calls56755.421998
Principles of a computer immune system10413.441997
Computer immunology.23551.361997
Building Diverse Computer Systems23336.551997