Author image not provided
 Christoph C Michael

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article17.91
Citation Count197
Publication count11
Publication years1995-2002
Available for download1
Average downloads per article2,068.00
Downloads (cumulative)2,068
Downloads (12 Months)19
Downloads (6 Weeks)1
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


11 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 11 of 11
Sort by:

1 published by ACM
August 2002 ACM Transactions on Information and System Security (TISSEC): Volume 5 Issue 3, August 2002
Publisher: ACM
Bibliometrics:
Citation Count: 16
Downloads (6 Weeks): 1,   Downloads (12 Months): 19,   Downloads (Overall): 2,068

Full text available: PDFPDF
This article describes variants of two state-based intrusion detection algorithms from Michael and Ghosh [2000] and Ghosh et al. [2000], and gives experimental results on their performance. The algorithms detect anomalies in execution audit data. One is a simply constructed finite-state machine, and the other two monitor statistical deviations from ...
Keywords: finite automata, Anomaly detection, information system security, intrusion detection, machine learning

2
December 2001 IEEE Transactions on Software Engineering: Volume 27 Issue 12, December 2001
Publisher: IEEE Press
Bibliometrics:
Citation Count: 118

This paper discusses the use of genetic algorithms (GAs) for automatic software test data generation. This research extends previous work on dynamic test data generation where the problem of test data generation is reduced to one of minimizing a function. In our work, the function is minimized by using one ...
Keywords: Software testing, automatic test case generation, code coverage, genetic algorithms, combinatorial optimization

3
December 2000 ACSAC '00: Proceedings of the 16th Annual Computer Security Applications Conference
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 9

This paper describes two intrusion detection algorithms, and gives experimental results on their performance. The algorithms detect anomalies in execution audit data. One is a simply constructed finite-state machine, and the other monitors statistical deviations from normal program behavior. The performance of these algorithms is evaluated as a function of ...
Keywords: auditing, execution audit data, experimental results, finite state machines, finite-state machine, program-based anomaly detection, algorithm performance, software performance evaluation, security of data, intrusion detection algorithms, n-grams, state-based approaches, statistical deviation monitoring

4
October 2000 RAID '00: Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 7

In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One effective way to detect intrusive activity before system damage is perpetrated is to detect misuse of privileged programs in real-time. In this paper, we describe three machine learning algorithms that ...

5
October 2000 RAID '00: Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 12

The use of program execution traces to detect intrusions has proven to be a successful strategy. Existing systems that employ this approach are anomaly detectors, meaning that they model a program's normal behavior and signal deviations from that behavior. Unfortunately, many program-based exploits of NT systems use specialized malicious executables. ...

6
March 1999 ASSET '99: Proceedings of the 1999 IEEE Symposium on Application - Specific Systems and Software Engineering and Technology
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

Our goal is to identify software modules that have some locations which do not propagate errors induced by a suite of test cases. This paper focuses on whether or not data state errors can propagate from a location in the code to the outputs or observable data state during random ...

7
October 1998 ASE '98: Proceedings of the 13th IEEE international conference on Automated software engineering
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 16


8
November 1997 ASE '97: Proceedings of the 12th international conference on Automated software engineering (formerly: KBSE)
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 16

In software testing, it is often desirable to find test inputs that exercise specific program features. To find these inputs by hand is extremely time-consuming, especially when the software is complex. Therefore, numerous attempts have been made to automate the process. Random test data generation consists of generating test inputs ...
Keywords: program features, test data generation, genetic algorithms, test adequacy criteria, test generation, combinatorial optimization, random test generation, software testing

9
March 1997 CSMR '97: Proceedings of the 1st Euromicro Working Conference on Software Maintenance and Reengineering (CSMR '97)
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

It is increasingly common for a software system to experience evolutionary changes during its lifetime. These changes need not only be the result of software maintenance-changes may occur in the operating environment, the purpose of the software, or the manner of implementation. It is often desirable to know how much ...
Keywords: evolving software, failure proneness assessment, operating environment, software maintenance, program repair, low failure probability, reliability growth models, repair process, testing, evolution constraints, evolutionary changes, pessimistic results, software performance evaluation

10
January 1997 Annals of Software Engineering: Volume 4 Issue 1-4, 1997
Publisher: J. C. Baltzer AG, Science Publishers
Bibliometrics:
Citation Count: 1

Many statistical methods for estimating software quality rely on representative testing: they assume a program is tested in an environment that simulates the environment where it will be used. Often, however, a software tester’s aim is to uncover defects as soon as possible, and representative testing may not be the ...

11
November 1995
Bibliometrics:
Citation Count: 0

During the past decade, there has been a resurgence of interest in applying mathematical methods to problems in artificial intelligence. Much work has been done in the field of machine learning, but it is not always clear how the results of this research should be applied to practical problems. Our ...
Keywords: pac model



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us