|  | 2010 | 
|---|
| 22 |            | Jiang Wang,
Sameer Niphadkar,
Angelos Stavrou,
Anup K. Ghosh:
A Virtualization Architecture for In-Depth Kernel Isolation.
HICSS 2010: 1-10 | 
|  | 2009 | 
|---|
| 21 |            | Yih Huang,
Anup K. Ghosh:
Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services.
NCA 2009: 114-117 | 
|  | 2008 | 
|---|
| 20 |            | Jiang Wang,
Anup K. Ghosh,
Yih Huang:
Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites.
CollaborateCom 2008: 24-33 | 
| 19 |            | Yih Huang,
Angelos Stavrou,
Anup K. Ghosh,
Sushil Jajodia:
Efficiently tracking application interactions using lightweight virtualization.
VMSec 2008: 19-28 | 
| 18 |            | Anup K. Ghosh,
Amitava Mukherjee,
Debashis Saha:
TCP throughput enhancement in wired-cum-wireless network.
Computer Communications 31(17): 4162-4166 (2008) | 
|  | 2007 | 
|---|
| 17 |            | Michael N. Gagnon,
Stephen Taylor,
Anup K. Ghosh:
Software Protection through Anti-Debugging.
IEEE Security & Privacy 5(3): 82-84 (2007) | 
|  | 2002 | 
|---|
| 16 |            | Matthew Schmid,
Frank Hill,
Anup K. Ghosh:
Protecting Data from Malicious Software.
ACSAC 2002: 199-208 | 
| 15 |            | Christoph C. Michael,
Anup K. Ghosh:
Simple, state-based approaches to program-based anomaly detection.
ACM Trans. Inf. Syst. Secur. 5(3): 203-237 (2002) | 
| 14 |            | Anup K. Ghosh,
Chuck Howell,
James A. Whittaker:
Building Software Securely from the Ground Up.
IEEE Software 19(1): 14-16 (2002) | 
|  | 2001 | 
|---|
| 13 |            | Matt Bishop,
Anup K. Ghosh,
James A. Whittaker:
How Useful is Software Fault Injection for Evaluating the Security of COTS Products?
ACSAC 2001: 339-342 | 
| 12 |            | Anup K. Ghosh,
Tara M. Swaminatha:
Software security and privacy risks in mobile e-commerce.
Commun. ACM 44(2): 51-57 (2001) | 
|  | 2000 | 
|---|
| 11 |            | Christoph C. Michael,
Anup K. Ghosh:
Two State-based Approaches to Program-based Anomaly Detection.
ACSAC 2000: 21- | 
| 10 |            | Christoph C. Michael,
Anup K. Ghosh:
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report.
Recent Advances in Intrusion Detection 2000: 66-79 | 
| 9 |            | Anup K. Ghosh,
Christoph C. Michael,
Michael Schatz:
A Real-Time Intrusion Detection System Based on Learning Program Behavior.
Recent Advances in Intrusion Detection 2000: 93-109 | 
|  | 1999 | 
|---|
| 8 |            | Anup K. Ghosh,
Aaron Schwartzbard:
Analyzing the Performance of Program Behavior Profiling for Intrusion Detection.
DBSec 1999: 19-32 | 
| 7 |            | Anup K. Ghosh,
Matthew Schmid,
Frank Hill:
Wrapping Windows NT Software for Robustness.
FTCS 1999: 344-347 | 
| 6 |            | Aaron Schwartzbard,
Anup K. Ghosh:
A Study in the Feasibility of Performing Host-Based Anomaly Detection on Windows NT.
Recent Advances in Intrusion Detection 1999 | 
| 5 |            | Anup K. Ghosh:
Certifying E-Commerce Software for Security.
WECWIS 1999: 64-67 | 
| 4 |            | Anup K. Ghosh,
Aaron Schwartzbard,
Michael Schatz:
Learning Program Behavior Profiles for Intrusion Detection.
Workshop on Intrusion Detection and Network Monitoring 1999: 51-62 | 
| 3 |            | Anup K. Ghosh,
Jeffrey M. Voas:
Inoculating Software for Survivability.
Commun. ACM 42(7): 38-44 (1999) | 
|  | 1998 | 
|---|
| 2 |            | Anup K. Ghosh:
E-Commerce Security: No Silver Bullet.
DBSec 1998: 3-16 | 
| 1 |            | Anup K. Ghosh,
Tom O'Connor,
Gary McGraw:
An Automated Approach for Identifying Potential Vulnerabilities in Software.
IEEE Symposium on Security and Privacy 1998: 104-114 |