Follow
Richard Lippmann
Richard Lippmann
Laboratory Fellow, MIT Lincoln Laboratory
Verified email at ll.mit.edu
Title
Cited by
Cited by
Year
An introduction to computing with neural nets
RP Lippmann
ACM SIGARCH Computer Architecture News 16 (1), 7-25, 1988
129221988
Automated generation and analysis of attack graphs
O Sheyner, J Haines, S Jha, R Lippmann, JM Wing
Proceedings 2002 IEEE Symposium on Security and Privacy, 273-284, 2002
19462002
The 1999 DARPA off-line intrusion detection evaluation
R Lippmann, JW Haines, DJ Fried, J Korba, K Das
Computer networks 34 (4), 579-595, 2000
1765*2000
Neural Network Classifiers Estimate Bayesian a posteriori Probabilities
MD Richard, RP Lippmann
Neural computation 3 (4), 461-483, 1991
16561991
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
RP Lippmann, DJ Fried, I Graf, JW Haines, KR Kendall, D McClung, ...
Proceedings DARPA Information survivability conference and exposition …, 2000
14372000
Pattern classification using neural networks
RP Lippmann
IEEE communications magazine 27 (11), 47-50, 1989
12381989
Speech recognition by machines and humans
RP Lippmann
Speech communication 22 (1), 1-15, 1997
8891997
Review of neural networks for speech recognition
RP Lippmann
Neural computation 1 (1), 1-38, 1989
8821989
Practical attack graph generation for network defense
K Ingols, R Lippmann, K Piwowarski
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 121-130, 2006
6012006
Multi-style training for robust isolated-word speech recognition
R Lippmann, E Martin, D Paul
ICASSP'87. IEEE International Conference on Acoustics, Speech, and Signal …, 1987
4741987
Improving intrusion detection performance using keyword selection and neural networks
RP Lippmann, RK Cunningham
Computer networks 34 (4), 597-603, 2000
3992000
Testing static analysis tools using exploitable buffer overflows from open source code
M Zitser, R Lippmann, T Leek
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on …, 2004
3862004
Modeling modern network attacks and countermeasures using attack graphs
K Ingols, M Chu, R Lippmann, S Webster, S Boyer
2009 Annual Computer Security Applications Conference, 117-126, 2009
3502009
Validating and restoring defense in depth using attack graphs
R Lippmann, K Ingols, C Scott, K Piwowarski, K Kratkiewicz, M Artz, ...
MILCOM 2006-2006 IEEE military communications conference, 1-10, 2006
3212006
Network security planning architecture
R Lippmann, C Scott, K Kratkiewicz, M Artz, KW Ingols
US Patent 7,194,769, 2007
3122007
Neural net and traditional classifiers
W Huang, RP Lippmann
Neural information processing systems, 1987
2991987
An annotated review of past papers on attack graphs
RP Lippmann, KW Ingols
Massachusetts Institute of Technology, Lincoln Laboratory 3, 32, 2005
2982005
Comparisons between neural networks and conventional classifiers.
W Haung
Proc. IEEE, Int. Conf. on Neural Networks IV, 485-493, 1987
2931987
Solving data mining problems through pattern recognition
RL Kennedy, Y Lee, B Van Roy, CD Reed, RP Lippmann
Upper Saddle River: Prentice-Hall,, 1997
2701997
An overview of issues in testing intrusion detection systems
P Mell, V Hu, R Lippmann, J Haines, M Zissman
2352003
The system can't perform the operation now. Try again later.
Articles 1–20