Follow
Richard Lippmann
Richard Lippmann
Laboratory Fellow, MIT Lincoln Laboratory
Verified email at ll.mit.edu
Title
Cited by
Cited by
Year
An introduction to computing with neural nets
RP Lippmann
ACM SIGARCH Computer Architecture News 16 (1), 7-25, 1988
129921988
Automated generation and analysis of attack graphs
O Sheyner, J Haines, S Jha, R Lippmann, JM Wing
Proceedings 2002 IEEE Symposium on Security and Privacy, 273-284, 2002
19682002
The 1999 DARPA off-line intrusion detection evaluation
R Lippmann, JW Haines, DJ Fried, J Korba, K Das
Computer networks 34 (4), 579-595, 2000
1775*2000
Neural Network Classifiers Estimate Bayesian a posteriori Probabilities
MD Richard, RP Lippmann
Neural computation 3 (4), 461-483, 1991
16671991
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
RP Lippmann, DJ Fried, I Graf, JW Haines, KR Kendall, D McClung, ...
Proceedings DARPA Information survivability conference and exposition …, 2000
14552000
Pattern classification using neural networks
RP Lippmann
IEEE communications magazine 27 (11), 47-50, 1989
12431989
Speech recognition by machines and humans
RP Lippmann
Speech communication 22 (1), 1-15, 1997
9011997
Review of neural networks for speech recognition
RP Lippmann
Neural computation 1 (1), 1-38, 1989
8871989
Practical attack graph generation for network defense
K Ingols, R Lippmann, K Piwowarski
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 121-130, 2006
6112006
Multi-style training for robust isolated-word speech recognition
R Lippmann, E Martin, D Paul
ICASSP'87. IEEE International Conference on Acoustics, Speech, and Signal …, 1987
4761987
Improving intrusion detection performance using keyword selection and neural networks
RP Lippmann, RK Cunningham
Computer networks 34 (4), 597-603, 2000
4012000
Testing static analysis tools using exploitable buffer overflows from open source code
M Zitser, R Lippmann, T Leek
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on …, 2004
3882004
Modeling modern network attacks and countermeasures using attack graphs
K Ingols, M Chu, R Lippmann, S Webster, S Boyer
2009 Annual Computer Security Applications Conference, 117-126, 2009
3522009
Validating and restoring defense in depth using attack graphs
R Lippmann, K Ingols, C Scott, K Piwowarski, K Kratkiewicz, M Artz, ...
MILCOM 2006-2006 IEEE military communications conference, 1-10, 2006
3232006
Network security planning architecture
R Lippmann, C Scott, K Kratkiewicz, M Artz, KW Ingols
US Patent 7,194,769, 2007
3182007
Neural net and traditional classifiers
W Huang, RP Lippmann
Neural information processing systems, 1987
3041987
An annotated review of past papers on attack graphs
RP Lippmann, KW Ingols
Massachusetts Institute of Technology, Lincoln Laboratory 3, 32, 2005
3012005
Comparisons between neural networks and conventional classifiers.
W Haung
Proc. IEEE, Int. Conf. on Neural Networks IV, 485-493, 1987
2931987
Solving data mining problems through pattern recognition
RL Kennedy, Y Lee, B Van Roy, CD Reed, RP Lippmann
Upper Saddle River: Prentice-Hall,, 1997
2701997
An overview of issues in testing intrusion detection systems
P Mell, V Hu, R Lippmann, J Haines, M Zissman
2372003
The system can't perform the operation now. Try again later.
Articles 1–20