An introduction to computing with neural nets RP Lippmann ACM SIGARCH Computer Architecture News 16 (1), 7-25, 1988 | 12992 | 1988 |
Automated generation and analysis of attack graphs O Sheyner, J Haines, S Jha, R Lippmann, JM Wing Proceedings 2002 IEEE Symposium on Security and Privacy, 273-284, 2002 | 1968 | 2002 |
The 1999 DARPA off-line intrusion detection evaluation R Lippmann, JW Haines, DJ Fried, J Korba, K Das Computer networks 34 (4), 579-595, 2000 | 1775* | 2000 |
Neural Network Classifiers Estimate Bayesian a posteriori Probabilities MD Richard, RP Lippmann Neural computation 3 (4), 461-483, 1991 | 1667 | 1991 |
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation RP Lippmann, DJ Fried, I Graf, JW Haines, KR Kendall, D McClung, ... Proceedings DARPA Information survivability conference and exposition …, 2000 | 1455 | 2000 |
Pattern classification using neural networks RP Lippmann IEEE communications magazine 27 (11), 47-50, 1989 | 1243 | 1989 |
Speech recognition by machines and humans RP Lippmann Speech communication 22 (1), 1-15, 1997 | 901 | 1997 |
Review of neural networks for speech recognition RP Lippmann Neural computation 1 (1), 1-38, 1989 | 887 | 1989 |
Practical attack graph generation for network defense K Ingols, R Lippmann, K Piwowarski 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 121-130, 2006 | 611 | 2006 |
Multi-style training for robust isolated-word speech recognition R Lippmann, E Martin, D Paul ICASSP'87. IEEE International Conference on Acoustics, Speech, and Signal …, 1987 | 476 | 1987 |
Improving intrusion detection performance using keyword selection and neural networks RP Lippmann, RK Cunningham Computer networks 34 (4), 597-603, 2000 | 401 | 2000 |
Testing static analysis tools using exploitable buffer overflows from open source code M Zitser, R Lippmann, T Leek Proceedings of the 12th ACM SIGSOFT twelfth international symposium on …, 2004 | 388 | 2004 |
Modeling modern network attacks and countermeasures using attack graphs K Ingols, M Chu, R Lippmann, S Webster, S Boyer 2009 Annual Computer Security Applications Conference, 117-126, 2009 | 352 | 2009 |
Validating and restoring defense in depth using attack graphs R Lippmann, K Ingols, C Scott, K Piwowarski, K Kratkiewicz, M Artz, ... MILCOM 2006-2006 IEEE military communications conference, 1-10, 2006 | 323 | 2006 |
Network security planning architecture R Lippmann, C Scott, K Kratkiewicz, M Artz, KW Ingols US Patent 7,194,769, 2007 | 318 | 2007 |
Neural net and traditional classifiers W Huang, RP Lippmann Neural information processing systems, 1987 | 304 | 1987 |
An annotated review of past papers on attack graphs RP Lippmann, KW Ingols Massachusetts Institute of Technology, Lincoln Laboratory 3, 32, 2005 | 301 | 2005 |
Comparisons between neural networks and conventional classifiers. W Haung Proc. IEEE, Int. Conf. on Neural Networks IV, 485-493, 1987 | 293 | 1987 |
Solving data mining problems through pattern recognition RL Kennedy, Y Lee, B Van Roy, CD Reed, RP Lippmann Upper Saddle River: Prentice-Hall,, 1997 | 270 | 1997 |
An overview of issues in testing intrusion detection systems P Mell, V Hu, R Lippmann, J Haines, M Zissman | 237 | 2003 |