What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Richard A. Kemmerer
Google Scholar
27
publications in security and cryptology related venues
Year
Venue
Title
2015
conf/acsac
Know Your Achilles' Heel: Automatic Detection of Network Critical Services.
Ali Zand
Amir Houmansadr
Giovanni Vigna
Richard A. Kemmerer
Christopher Kruegel
2014
conf/ccs
Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared?
Maria B. Line
Ali Zand
Gianluca Stringhini
Richard A. Kemmerer
2014
conf/sp
The Tricks of the Trade: What Makes Spam Campaigns Successful?
Jane Iedemska
Gianluca Stringhini
Richard A. Kemmerer
Christopher Kruegel
Giovanni Vigna
2013
conf/ndss
20 Years of Network and Distributed Systems Security: The Good, the Bad, and the Ugly.
Richard A. Kemmerer
2009
conf/ccs
Your botnet is my botnet: analysis of a botnet takeover.
Brett Stone-Gross
Marco Cova
Lorenzo Cavallaro
Bob Gilbert
Martin Szydlowski
Richard A. Kemmerer
Christopher Kruegel
Giovanni Vigna
2009
conf/icics
How to Steal a Botnet and What Can Happen When You Do.
Richard A. Kemmerer
2007
conf/acsac
So You Think You Can Dance?
Richard A. Kemmerer
2006
conf/ndss
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks.
William K. Robertson
Giovanni Vigna
Christopher Krügel
Richard A. Kemmerer
2004
conf/acsac
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks.
Giovanni Vigna
Sumit Gwalani
Kavitha Srinivasan
Elizabeth M. Belding-Royer
Richard A. Kemmerer
2003
conf/acsac
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems.
Darren Mutz
Giovanni Vigna
Richard A. Kemmerer
2003
conf/acsac
A Stateful Intrusion Detection System for World-Wide Web Servers.
Giovanni Vigna
William K. Robertson
Vishal Kher
Richard A. Kemmerer
2002
conf/sp
Stateful Intrusion Detection for High-Speed Networks.
Christopher Krügel
Fredrik Valeur
Giovanni Vigna
Richard A. Kemmerer
2002
conf/acsac
Composable Tools For Network Discovery and Security Analysis.
Giovanni Vigna
Fredrik Valeur
Jingyu Zhou
Richard A. Kemmerer
2002
conf/acsac
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later.
Richard A. Kemmerer
2000
conf/acsac
Implementing Security Policies using the Safe Areas of Computation Approach.
André L. M. dos Santos
Richard A. Kemmerer
1999
conf/acsac
Safe Areas of Computation for Secure Computing with Insecure Applications.
André L. M. dos Santos
Richard A. Kemmerer
1998
conf/acsac
NetSTAT: A Network-Based Intrusion Detection Approach.
Giovanni Vigna
Richard A. Kemmerer
1996
conf/acsac
A Modular Covert Channel Analysis Methodology for Trusted DG/UX<sup>TM</sup>.
Richard A. Kemmerer
Tad Taylor
1994
journals/joc
Three System for Cryptographic Protocol Analysis.
Richard A. Kemmerer
Catherine Meadows
Jonathan K. Millen
1992
conf/acsac
Penetration state transition analysis: A rule-based intrusion detection approach.
Phillip A. Porras
Richard A. Kemmerer
1991
conf/sp
Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels.
Phillip A. Porras
Richard A. Kemmerer
1987
conf/crypto
Analyzing Encryption Protocols Using Formal Verification Authentication Schemes.
Richard A. Kemmerer
1987
conf/sp
Using Formal Verification Techniques to Analyze Encryption Protocols.
Richard A. Kemmerer
1986
conf/sp
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
J. Thomas Haigh
Richard A. Kemmerer
John McHugh
William D. Young
1986
conf/eurocrypt
Analyzing Encryption Protocols Using Formal Verification Techniques.
Richard A. Kemmerer
1983
conf/sp
SDC Secure Release Terminal Project.
Thomas H. Hinke
Jose Althouse
Richard A. Kemmerer
1982
conf/sp
A Practical Approach to Identifying Storage and Timing Channels.
Richard A. Kemmerer
Coauthors
Ali Zand
(2)
Amir Houmansadr
(1)
André L. M. dos Santos
(2)
Bob Gilbert
(1)
Brett Stone-Gross
(1)
Catherine Meadows
(1)
Christopher Kruegel
(3)
Christopher Krügel
(2)
Darren Mutz
(1)
Elizabeth M. Belding-Royer
(1)
Fredrik Valeur
(2)
Gianluca Stringhini
(2)
Giovanni Vigna
(10)
J. Thomas Haigh
(1)
Jane Iedemska
(1)
Jingyu Zhou
(1)
John McHugh
(1)
Jonathan K. Millen
(1)
Jose Althouse
(1)
Kavitha Srinivasan
(1)
Lorenzo Cavallaro
(1)
Marco Cova
(1)
Maria B. Line
(1)
Martin Szydlowski
(1)
Phillip A. Porras
(2)
Richard A. Kemmerer
(27)
Sumit Gwalani
(1)
Tad Taylor
(1)
Thomas H. Hinke
(1)
Vishal Kher
(1)
William D. Young
(1)
William K. Robertson
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to