Name
Papers
Collaborators
RICHARD A. KEMMERER
76
80
Citations 
PageRank 
Referers 
1462
171.20
2688
Referees 
References 
891
732
Search Limit
1001000
Title
Citations
PageRank
Year
Know Your Achilles' Heel: Automatic Detection of Network Critical Services10.392015
Prison: Tracking Process Interactions to Contain Malware10.342015
Rippler: Delay injection for service dependency detection80.522014
Formulating Cyber-Security as Convex Optimization Problems20.652013
20 Years of Network and Distributed Systems Security: The Good, the Bad, and the Ugly.00.342013
Formal analysis of an electronic voting system: An experience report40.392011
MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper).00.342011
Refinement and Verification of Real-Time Systems00.342010
Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 200800.342009
Formal analysis of attacks for e-voting system20.362009
How to steal a botnet and what can happen when you do00.342009
Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.200882.682008
08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense10.392008
08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense00.342008
08102 Outcome Working Group -- Situational Awareness00.342008
Using a virtual security testbed for digital forensic reconstruction60.692007
So You Think You Can Dance?00.342007
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks592.552006
Using hidden markov models to evaluate the risks of intrusions251.782006
Behavior-based spyware detection918.342006
Digital forensic reconstruction and the virtual security testbed vise70.602006
Hi-DRA: Intrusion Detection for Internet Security150.742005
Designing and implementing a family of intrusion detection systems70.822005
Past pushdown timed automata and safety verification60.522004
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks532.562004
Internet security and intrusion detection10.422003
Presburger liveness verification of discrete timed automata100.552003
Cybersecurity.00.342003
A Stateful Intrusion Detection System for World-Wide Web Servers594.342003
Generalized discrete timed automata: decidable approximations for safety verification90.602003
Designing and implementing a family of intrusion detection systems352.572003
Stateful intrusion detection for high-speed network's1188.222002
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later281.742002
STATL: an attack language for state-based intrusion detection17013.592002
Composable Tools For Network Discovery and Security Analysis50.962002
Counter machines and verification Problems140.712002
Decidable Approximations on Generalized and Parameterized Discrete Timed Automata60.502001
Designing a Web of Highly-Configurable Intrusion Detection Sensors254.352001
Evaluating the Security of Three Java-Based Mobile Agent Systems110.892001
On Presburger Liveness of Discrete Timed Automata60.462001
Conter Machines: Decidable Properties and Applications to Verification Problems210.872000
Binary Reachability Analysis of Discrete Pushdown Timed Automata531.732000
Three approximation techniques for ASTRAL symbolic model checking of infinite state real-time systems80.542000
Parallel Refinement Mechanisms for Real-Time Systems10.372000
Implementing security policies using the Safe Areas of Computation approach20.452000
NetSTAT: a network-based intrusion detection system10819.461999
Safe Areas of Computation for Secure Computing with Insecure Applications50.551999
The design and analysis of real-time systems using the ASTRAL software development environment130.771999
Editorial00.341999
Using the ASTRAL model checker to analyze Mobile IP191.441999
  • 1
  • 2