Follow
Anil Somayaji
Anil Somayaji
Associate Professor, School of Computer Science, Carleton University
Verified email at scs.carleton.ca
Title
Cited by
Cited by
Year
A sense of self for unix processes
S Forrest, SA Hofmeyr, A Somayaji, TA Longstaff
Proceedings 1996 IEEE Symposium on Security and Privacy, 120-128, 1996
31031996
Intrusion detection using sequences of system calls
SA Hofmeyr, S Forrest, A Somayaji
Journal of computer security 6 (3), 151-180, 1998
22001998
Computer immunology
S Forrest, SA Hofmeyr, A Somayaji
Communications of the ACM 40 (10), 88-96, 1997
12921997
Building diverse computer systems
S Forrest, A Somayaji, DH Ackley
Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No …, 1997
7711997
A methodology for empirical analysis of permission-based security models and its application to android
D Barrera, HG Kayacik, PC van Oorschot, A Somayaji
Proceedings of the 17th ACM conference on Computer and communications …, 2010
7322010
Principles of a computer immune system
A Somayaji, S Hofmeyr, S Forrest
Proceedings of the 1997 workshop on New security paradigms, 75-82, 1998
5481998
Automated Response Using System-Call Delay.
A Somayaji, S Forrest
Usenix Security Symposium, 185-197, 2000
4202000
Pass-thoughts: authenticating with our minds
J Thorpe, PC Van Oorschot, A Somayaji
Proceedings of the 2005 workshop on New security paradigms, 45-56, 2005
2602005
The evolution of system-call monitoring
S Forrest, S Hofmeyr, A Somayaji
2008 annual computer security applications conference (acsac), 418-430, 2008
1882008
A generic attack on checksumming-based software tamper resistance
G Wurster, PC Van Oorschot, A Somayaji
2005 IEEE Symposium on Security and Privacy (S&P'05), 127-138, 2005
1592005
Operating system stability and security through process homeostasis
AB Somayaji
University of New Mexico, 2002
1382002
Learning DFA representations of HTTP for protecting web applications
KL Ingham, A Somayaji, J Burge, S Forrest
Computer Networks 51 (5), 1239-1255, 2007
1372007
A clinical study of risk factors related to malware infections
F Lalonde Levesque, J Nsiempba, JM Fernandez, S Chiasson, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1152013
Hardware-assisted circumvention of self-hashing software tamper resistance
PC Van Oorschot, A Somayaji, G Wurster
IEEE Transactions on Dependable and Secure Computing 2 (2), 82-92, 2005
1142005
Analysis of the 1999 darpa/lincoln laboratory ids evaluation data with netadhict
C Brown, A Cowperthwaite, A Hijazi, A Somayaji
2009 IEEE Symposium on Computational Intelligence for Security and Defense …, 2009
1092009
SOMA: Mutual approval for included content in web pages
T Oda, G Wurster, PC van Oorschot, A Somayaji
Proceedings of the 15th ACM conference on Computer and communications …, 2008
952008
System and method for implicit authentication
DC Dutt, AB Somayaji, MJK Bingham
US Patent 9,788,203, 2017
802017
Context-dependent authentication system, method and device
DC Dutt, AB Somayaji
US Patent 9,619,852, 2017
722017
Cloud Security: Attacks and Current Defenses
G Booth, A Soknacki, A Somayaji
8th Annual Symposium on Information Assurance (ASIA’13), 56, 2013
452013
Software diversity: security, entropy and game theory
S Neti, A Somayaji, ME Locasto
7th USENIX HotSec, 2012
442012
The system can't perform the operation now. Try again later.
Articles 1–20