Follow
Anil Somayaji
Anil Somayaji
Associate Professor, School of Computer Science, Carleton University
Verified email at scs.carleton.ca
Title
Cited by
Cited by
Year
A sense of self for unix processes
S Forrest, SA Hofmeyr, A Somayaji, TA Longstaff
Proceedings 1996 IEEE Symposium on Security and Privacy, 120-128, 1996
30601996
Intrusion detection using sequences of system calls
SA Hofmeyr, S Forrest, A Somayaji
Journal of computer security 6 (3), 151-180, 1998
21761998
Computer immunology
S Forrest, SA Hofmeyr, A Somayaji
Communications of the ACM 40 (10), 88-96, 1997
12851997
Building diverse computer systems
S Forrest, A Somayaji, DH Ackley
Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No …, 1997
7571997
A methodology for empirical analysis of permission-based security models and its application to android
D Barrera, HG Kayacik, PC van Oorschot, A Somayaji
Proceedings of the 17th ACM conference on Computer and communications …, 2010
7262010
Principles of a computer immune system
A Somayaji, S Hofmeyr, S Forrest
Proceedings of the 1997 workshop on New security paradigms, 75-82, 1998
5431998
Automated Response Using System-Call Delay.
A Somayaji, S Forrest
Usenix Security Symposium, 185-197, 2000
4172000
Pass-thoughts: authenticating with our minds
J Thorpe, PC Van Oorschot, A Somayaji
Proceedings of the 2005 workshop on New security paradigms, 45-56, 2005
2572005
The evolution of system-call monitoring
S Forrest, S Hofmeyr, A Somayaji
2008 annual computer security applications conference (acsac), 418-430, 2008
1822008
A generic attack on checksumming-based software tamper resistance
G Wurster, PC Van Oorschot, A Somayaji
2005 IEEE Symposium on Security and Privacy (S&P'05), 127-138, 2005
1582005
Operating system stability and security through process homeostasis
AB Somayaji
University of New Mexico, 2002
1382002
Learning DFA representations of HTTP for protecting web applications
KL Ingham, A Somayaji, J Burge, S Forrest
Computer Networks 51 (5), 1239-1255, 2007
1332007
A clinical study of risk factors related to malware infections
F Lalonde Levesque, J Nsiempba, JM Fernandez, S Chiasson, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1132013
Hardware-assisted circumvention of self-hashing software tamper resistance
PC Van Oorschot, A Somayaji, G Wurster
IEEE Transactions on Dependable and Secure Computing 2 (2), 82-92, 2005
1112005
Analysis of the 1999 darpa/lincoln laboratory ids evaluation data with netadhict
C Brown, A Cowperthwaite, A Hijazi, A Somayaji
2009 IEEE Symposium on Computational Intelligence for Security and Defense …, 2009
1062009
SOMA: Mutual approval for included content in web pages
T Oda, G Wurster, PC van Oorschot, A Somayaji
Proceedings of the 15th ACM conference on Computer and communications …, 2008
962008
System and method for implicit authentication
DC Dutt, AB Somayaji, MJK Bingham
US Patent 9,788,203, 2017
602017
Context-dependent authentication system, method and device
DC Dutt, AB Somayaji
US Patent 9,619,852, 2017
582017
Cloud Security: Attacks and Current Defenses
G Booth, A Soknacki, A Somayaji
8th Annual Symposium on Information Assurance (ASIA’13), 56, 2013
412013
Software diversity: security, entropy and game theory
S Neti, A Somayaji, ME Locasto
7th USENIX HotSec, 2012
412012
The system can't perform the operation now. Try again later.
Articles 1–20