Robert K. Cunningham
Robert K. Cunningham
CMU and Pitt
Verified email at - Homepage
Cited by
Cited by
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
RP Lippmann, DJ Fried, I Graf, JW Haines, KR Kendall, D McClung, ...
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
A taxonomy of computer worms
N Weaver, V Paxson, S Staniford, R Cunningham
Proceedings of the 2003 ACM workshop on Rapid Malcode, 11-18, 2003
Technique for detecting executable malicious code using a combination of static and dynamic analyses
R Khazan, J Rabek, S Lewandowski, R Cunningham
US Patent App. 10/464,828, 2005
Fusing a heterogeneous alert stream into scenarios
O Dain, RK Cunningham
Applications of Data Mining in Computer Security 6, 103-122, 2002
Improving intrusion detection performance using keyword selection and neural networks
RP Lippmann, RK Cunningham
Computer networks 34 (4), 597-603, 2000
Validating and restoring defense in depth using attack graphs
R Lippmann, K Ingols, C Scott, K Piwowarski, K Kratkiewicz, M Artz, ...
MILCOM 2006-2006 IEEE Military Communications Conference, 1-10, 2006
The real cost of software errors
M Zhivich, RK Cunningham
IEEE Security & Privacy 7 (2), 87-90, 2009
Why measuring security is hard
S Pfleeger, R Cunningham
IEEE Security & Privacy 8 (4), 46-54, 2010
Detection of injected, dynamically generated, and obfuscated malicious code
JC Rabek, RI Khazan, SM Lewandowski, RK Cunningham
Proceedings of the 2003 ACM workshop on Rapid malcode, 76-82, 2003
LARIAT: Lincoln adaptable real-time information assurance testbed
LM Rossey, RK Cunningham, DJ Fried, JC Rabek, RP Lippmann, ...
Proceedings, ieee aerospace conference 6, 6-6, 2002
Sok: Cryptographically protected database search
B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ...
2017 IEEE Symposium on Security and Privacy (SP), 172-191, 2017
Building scenarios from a heterogeneous alert stream
OM Dain, RK Cunningham
Proceedings of the 2001 IEEE workshop on Information Assurance and Security 235, 2001
Gnuplot 4.4: an interactive plotting program. 2010
T Williams, C Kelley, HB Bröker, J Campbell, R Cunningham, D Denholm, ...
URL http://www. gnuplot. info 56, 2017
Evaluating and strengthening enterprise network security using attack graphs
RP Lippmann, KW Ingols, C Scott, K Piwowarski, K Kratkiewicz, M Artz, ...
Technical Report ESC-TR-2005-064, MIT Lincoln Laboratory, 2005
Extending the darpa off-line intrusion detection evaluations
JW Haines, LM Rossey, RP Lippmann, RK Cunningham
Proceedings DARPA Information Survivability Conference and Exposition II …, 2001
Computing on masked data: a high performance method for improving big data veracity
J Kepner, V Gadepally, P Michaleas, N Schear, M Varia, A Yerukhimovich, ...
2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014
Evaluating intrusion detection systems without attacking your friends: The 1998 DARPA intrusion detection evaluation
RK Cunningham, RP Lippmann, DJ Fried, SL Garfinkel, I Graf, KR Kendall, ...
Proceedings of ID 99, 1999
Neural processing of targets in visible, multispectral IR and SAR imagery
AM Waxman, MC Seibert, A Gove, DA Fay, AM Bernardon, C Lazott, ...
Neural Networks 8 (7-8), 1029-1051, 1995
gnuplot 4.6
T Williams, C Kelley, HB Bröker, J Campbell, R Cunningham, D Denholm, ...
An Interactive Plotting Program, 2012
Blockchain technology: what is it good for?
S Ruoti, B Kaiser, A Yerukhimovich, J Clark, R Cunningham
Communications of the ACM 63 (1), 46-53, 2019
The system can't perform the operation now. Try again later.
Articles 1–20