Остановите войну!
for scientists:
default search action
Anil Somayaji
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [i4]William Findlay, David Barrera, Anil Somayaji:
BPFContain: Fixing the Soft Underbelly of Container Security. CoRR abs/2102.06972 (2021) - 2020
- [c32]William Findlay, Anil Somayaji, David Barrera:
bpfbox: Simple Precise Process Confinement with eBPF. CCSW 2020: 91-103 - [c31]Nour Dabbour, Anil Somayaji:
Towards In-Band Non-Cryptographic Authentication. NSPW 2020: 20-33
2010 – 2019
- 2019
- [i3]Mohamed Alsharnouby, Anil Somayaji:
Thread Homeostasis: Real-Time Anomalous Behavior Detection for Safety-Critical Software. CoRR abs/1910.01012 (2019) - 2018
- [j8]Shiven Sharma, Anil Somayaji, Nathalie Japkowicz:
Learning over subconcepts: Strategies for 1-class classification. Comput. Intell. 34(2): 440-467 (2018) - [j7]Fanny Lalonde Lévesque, Sonia Chiasson, Anil Somayaji, José M. Fernandez:
Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach. ACM Trans. Priv. Secur. 21(4): 18:1-18:30 (2018) - [c30]Mark Burgess, Anil Somayaji:
After the BlockCLoud Apocalypse. NSPW 2018: 103-109 - [e5]Marco Carvalho, Matt Bishop, Anil Somayaji, Wolter Pieters, Mohammad Mannan:
Proceedings of the New Security Paradigms Workshop, NSPW 2018, Windsor, UK, August 28-31, 2018. ACM 2018, ISBN 978-1-4503-6597-0 [contents] - 2017
- [c29]Borke Obada-Obieh, Anil Somayaji:
Can I believe you?: Establishing Trust in Computer Mediated Introductions. NSPW 2017: 94-106 - 2015
- [c28]Fanny Lalonde Lévesque, Anil Somayaji, Dennis Batchelder, José M. Fernandez:
Measuring the health of antivirus ecosystems. MALWARE 2015: 101-109 - [e4]Anil Somayaji, Paul C. van Oorschot, Mohammad Mannan, Rainer Böhme:
Proceedings of the 2015 New Security Paradigms Workshop, NSPW 2015, Twente, The Netherlands, September 8-11, 2015. ACM 2015, ISBN 978-1-4503-3754-0 [contents] - 2014
- [c27]Fanny Lalonde Lévesque, José M. Fernandez, Anil Somayaji:
Risk prediction of malware victimization based on user behavior. MALWARE 2014: 128-134 - [e3]Konstantin Beznosov, Anil Somayaji, Tom Longstaff, Paul C. van Oorschot:
Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014. ACM 2014, ISBN 978-1-4503-3062-6 [contents] - 2013
- [c26]Fanny Lalonde Lévesque, Jude Nsiempba, José M. Fernandez, Sonia Chiasson, Anil Somayaji:
A clinical study of risk factors related to malware infections. CCS 2013: 97-108 - [c25]Anil Somayaji, David Mould, Carson Brown:
Towards narrative authentication: or, against boring authentication. NSPW 2013: 57-64 - 2012
- [c24]Fanny Lalonde Lévesque, Carlton R. Davis, José M. Fernandez, Sonia Chiasson, Anil Somayaji:
Methodology for a Field Study of Anti-malware Software. Financial Cryptography Workshops 2012: 80-85 - [c23]Saran Neti, Anil Somayaji, Michael E. Locasto:
Software Diversity: Security, Entropy and Game Theory. HotSec 2012 - 2010
- [c22]Joan Calvet, Carlton R. Davis, José M. Fernandez, Jean-Yves Marion, Pier-Luc St-Onge, Wadie Guizani, Pierre-Marc Bureau, Anil Somayaji:
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet. ACSAC 2010: 141-150 - [c21]David Barrera, Hilmi Günes Kayacik, Paul C. van Oorschot, Anil Somayaji:
A methodology for empirical analysis of permission-based security models and its application to android. CCS 2010: 73-84 - [c20]Blair Foster, Anil Somayaji:
Object-level recombination of commodity applications. GECCO 2010: 957-964 - [c19]Terri Oda, Anil Somayaji:
Visual Security Policy for the Web. HotSec 2010 - [i2]Mohammad R. Nikseresht, Anil Somayaji, Anil Maheshwari:
Customer Appeasement Scheduling. CoRR abs/1012.3452 (2010)
2000 – 2009
- 2009
- [c18]Carson Brown, Alex Cowperthwaite, Abdulrahman Hijazi, Anil Somayaji:
Analysis of the 1999 DARPA/Lincoln Laboratory IDS evaluation data with NetADHICT. CISDA 2009: 1-7 - [c17]Anil Somayaji, Yiru Li, Hajime Inoue, José M. Fernandez, Richard Ford:
Evaluating Security Products with Clinical Trials. CSET 2009 - [e2]Anil Somayaji, Richard Ford:
Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009. ACM 2009, ISBN 978-1-60558-845-2 [contents] - 2008
- [c16]Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji:
The Evolution of System-Call Monitoring. ACSAC 2008: 418-430 - [c15]Terri Oda, Glenn Wurster, Paul C. van Oorschot, Anil Somayaji:
SOMA: mutual approval for included content in web pages. CCS 2008: 89-98 - [c14]Abdulrahman Hijazi, Hajime Inoue, Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji:
Discovering Packet Structure through Lightweight Hierarchical Clustering. ICC 2008: 33-39 - [e1]Matt Bishop, Christian W. Probst, Angelos D. Keromytis, Anil Somayaji:
Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008. ACM 2008, ISBN 978-1-60558-341-9 [contents] - 2007
- [j6]Kenneth L. Ingham, Anil Somayaji, John Burge, Stephanie Forrest:
Learning DFA representations of HTTP for protecting web applications. Comput. Networks 51(5): 1239-1255 (2007) - [j5]Anil Somayaji:
Immunology, diversity, and homeostasis: The past and future of biologically inspired computer defenses. Inf. Secur. Tech. Rep. 12(4): 228-234 (2007) - [c13]Kenneth L. Ingham, Anil Somayaji:
A methodology for designing accurate anomaly detection systems. LANC 2007: 139-143 - [c12]Hajime Inoue, Dana Jansens, Abdulrahman Hijazi, Anil Somayaji:
NetADHICT: A Tool for Understanding Network Traffic. LISA 2007: 39-47 - [c11]Anil Somayaji, Michael E. Locasto, Jan Feyereisl:
The future of biologically-inspired security: is there anything left to learn? NSPW 2007: 49-54 - 2005
- [j4]Paul C. van Oorschot, Anil Somayaji, Glenn Wurster:
Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance. IEEE Trans. Dependable Secur. Comput. 2(2): 82-92 (2005) - [c10]Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji:
Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. ACNS 2005: 104-121 - [c9]Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John P. McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov:
Highlights from the 2005 New Security Paradigms Workshop. ACSAC 2005: 393-396 - [c8]Yiru Li, Anil Somayaji:
Securing Email Archives through User Modeling. ACSAC 2005: 547-556 - [c7]Evan Hughes, Anil Somayaji:
Towards Network Awareness. LISA 2005: 113-124 - [c6]Julie Thorpe, Paul C. van Oorschot, Anil Somayaji:
Pass-thoughts: authenticating with our minds. NSPW 2005: 45-56 - [c5]Glenn Wurster, Paul C. van Oorschot, Anil Somayaji:
A Generic Attack on Checksumming-Based Software Tamper Resistance. S&P 2005: 127-138 - [i1]Julie Thorpe, Paul C. van Oorschot, Anil Somayaji:
Pass-thoughts: Authenticating With Our Minds. IACR Cryptol. ePrint Arch. 2005: 121 (2005) - 2004
- [j3]Anil Somayaji:
How to Win and Evolutionary Arms Race. IEEE Secur. Priv. 2(6): 70-72 (2004) - 2000
- [c4]Anil Somayaji, Stephanie Forrest:
Automated Response Using System-Call Delay. USENIX Security Symposium 2000
1990 – 1999
- 1998
- [j2]Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji:
Intrusion Detection Using Sequences of System Calls. J. Comput. Secur. 6(3): 151-180 (1998) - 1997
- [j1]Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji:
Computer Immunology. Commun. ACM 40(10): 88-96 (1997) - [c3]Stephanie Forrest, Anil Somayaji, David H. Ackley:
Building Diverse Computer Systems. Workshop on Hot Topics in Operating Systems 1997: 67-72 - [c2]Anil Somayaji, Steven A. Hofmeyr, Stephanie Forrest:
Principles of a computer immune system. NSPW 1997: 75-82 - 1996
- [c1]Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff:
A Sense of Self for Unix Processes. S&P 1996: 120-128
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint