Richard Lippmann
Richard Lippmann
Laboratory Fellow, MIT Lincoln Laboratory
Verified email at
Cited by
Cited by
An introduction to computing with neural nets
RP Lippmann
ACM SIGARCH Computer Architecture News 16 (1), 7-25, 1988
Automated generation and analysis of attack graphs
O Sheyner, J Haines, S Jha, R Lippmann, JM Wing
Proceedings 2002 IEEE Symposium on Security and Privacy, 273-284, 2002
The 1999 DARPA off-line intrusion detection evaluation
R Lippmann, JW Haines, DJ Fried, J Korba, K Das
Computer networks 34 (4), 579-595, 2000
Neural Network Classifiers Estimate Bayesian a posteriori Probabilities
MD Richard, RP Lippmann
Neural computation 3 (4), 461-483, 1991
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
RP Lippmann, DJ Fried, I Graf, JW Haines, KR Kendall, D McClung, ...
Proceedings DARPA Information survivability conference and exposition …, 2000
Pattern classification using neural networks
RP Lippmann
IEEE communications magazine 27 (11), 47-50, 1989
Speech recognition by machines and humans
RP Lippmann
Speech communication 22 (1), 1-15, 1997
Review of neural networks for speech recognition
RP Lippmann
Neural computation 1 (1), 1-38, 1989
Practical attack graph generation for network defense
K Ingols, R Lippmann, K Piwowarski
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 121-130, 2006
Multi-style training for robust isolated-word speech recognition
R Lippmann, E Martin, D Paul
ICASSP'87. IEEE International Conference on Acoustics, Speech, and Signal …, 1987
Improving intrusion detection performance using keyword selection and neural networks
RP Lippmann, RK Cunningham
Computer networks 34 (4), 597-603, 2000
Testing static analysis tools using exploitable buffer overflows from open source code
M Zitser, R Lippmann, T Leek
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on …, 2004
Modeling modern network attacks and countermeasures using attack graphs
K Ingols, M Chu, R Lippmann, S Webster, S Boyer
2009 Annual Computer Security Applications Conference, 117-126, 2009
Validating and restoring defense in depth using attack graphs
R Lippmann, K Ingols, C Scott, K Piwowarski, K Kratkiewicz, M Artz, ...
MILCOM 2006-2006 IEEE military communications conference, 1-10, 2006
Network security planning architecture
R Lippmann, C Scott, K Kratkiewicz, M Artz, KW Ingols
US Patent 7,194,769, 2007
Neural net and traditional classifiers
W Huang, RP Lippmann
Neural information processing systems, 1987
An annotated review of past papers on attack graphs
RP Lippmann, KW Ingols
Massachusetts Institute of Technology, Lincoln Laboratory 3, 32, 2005
Comparisons between neural networks and conventional classifiers.
W Haung
Proc. IEEE, Int. Conf. on Neural Networks IV, 485-493, 1987
Solving data mining problems through pattern recognition
RL Kennedy, Y Lee, B Van Roy, CD Reed, RP Lippmann
Upper Saddle River: Prentice-Hall,, 1997
An overview of issues in testing intrusion detection systems
P Mell, V Hu, R Lippmann, J Haines, M Zissman
The system can't perform the operation now. Try again later.
Articles 1–20