Follow
Richard Lippmann
Richard Lippmann
Laboratory Fellow, MIT Lincoln Laboratory
Verified email at ll.mit.edu
Title
Cited by
Cited by
Year
An introduction to computing with neural nets
R Lippmann
IEEE Assp magazine 4 (2), 4-22, 1987
130151987
Automated generation and analysis of attack graphs
O Sheyner, J Haines, S Jha, R Lippmann, JM Wing
Proceedings 2002 IEEE Symposium on Security and Privacy, 273-284, 2002
19102002
The 1999 DARPA off-line intrusion detection evaluation
R Lippmann, JW Haines, DJ Fried, J Korba, K Das
Computer networks 34 (4), 579-595, 2000
1679*2000
Neural Network Classifiers Estimate Bayesian a posteriori Probabilities
MD Richard, RP Lippmann
Neural computation 3 (4), 461-483, 1991
16411991
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
RP Lippmann, DJ Fried, I Graf, JW Haines, KR Kendall, D McClung, ...
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
14672000
Pattern classification using neural networks
RP Lippmann
IEEE communications magazine 27 (11), 47-50, 1989
12361989
Speech recognition by machines and humans
RP Lippmann
Speech communication 22 (1), 1-15, 1997
8731997
Review of neural networks for speech recognition
RP Lippmann
Neural computation 1 (1), 1-38, 1989
8731989
Practical attack graph generation for network defense
K Ingols, R Lippmann, K Piwowarski
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 121-130, 2006
5902006
Multi-style training for robust isolated-word speech recognition
R Lippmann, E Martin, D Paul
ICASSP'87. IEEE International Conference on Acoustics, Speech, and Signal …, 1987
4701987
Improving intrusion detection performance using keyword selection and neural networks
RP Lippmann, RK Cunningham
Computer networks 34 (4), 597-603, 2000
3932000
Testing static analysis tools using exploitable buffer overflows from open source code
M Zitser, R Lippmann, T Leek
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on …, 2004
3812004
Modeling modern network attacks and countermeasures using attack graphs
K Ingols, M Chu, R Lippmann, S Webster, S Boyer
2009 Annual Computer Security Applications Conference, 117-126, 2009
3452009
Validating and restoring defense in depth using attack graphs
R Lippmann, K Ingols, C Scott, K Piwowarski, K Kratkiewicz, M Artz, ...
MILCOM 2006-2006 IEEE Military Communications Conference, 1-10, 2006
3022006
Neural net and traditional classifiers
W Huang, RP Lippmann
Neural information processing systems, 1987
3021987
Comparisons between neural networks and conventional classifiers.
W Haung
Proc. IEEE, Int. Conf. on Neural Networks IV, 485-493, 1987
2951987
Network security planning architecture
R Lippmann, C Scott, K Kratkiewicz, M Artz, KW Ingols
US Patent 7,194,769, 2007
2942007
An annotated review of past papers on attack graphs
RP Lippmann, KW Ingols
Massachusetts Institute of Technology, Lincoln Laboratory 3, 32, 2005
2922005
Solving data mining problems through pattern recognition
RL Kennedy
(No Title), 1997
2711997
An overview of issues in testing intrusion detection systems
P Mell, V Hu, R Lippmann, J Haines, M Zissman
2302003
The system can't perform the operation now. Try again later.
Articles 1–20