Levitt, Karl
84  Ergebnisse:
Personensuche X
?
1

Autonomous Vehicle Security: Composing Attack, Defense, and..:

, In: Proceedings of the 2022 New Security Paradigms Workshop,
 
?
2

Augmenting Machine Learning with Argumentation:

, In: Proceedings of the New Security Paradigms Workshop,
Bishop, Matt ; Gates, Carrie ; Levitt, Karl - p. 1-11 , 2018
 
?
 
?
4

Generation bidding game with potentially false attestation ..:

Shan, Yuquan ; Raghuram, Jayaram ; Kesidis, George...
EURASIP Journal on Advances in Signal Processing.  2015 (2015)  1 - p. , 2015
 
?
5

Towards the realization of a public health system for share..:

, In: Proceedings of the 2013 New Security Paradigms Workshop,
Rowe, Jeff ; Levitt, Karl ; Hogarth, Mike - p. 11-18 , 2013
 
?
6

Argumentation logic to assist in security administration:

, In: Proceedings of the 2012 New Security Paradigms Workshop,
Rowe, Jeff ; Levitt, Karl ; Parsons, Simon... - p. 43-52 , 2012
 
?
7

A framework for diversifying windows native APIs to tolerat..:

, In: Proceedings of the 2nd ACM symposium on Information, computer and communications security,
Nguyen, Lynette Qu ; Demir, Tufan ; Rowe, Jeff.. - p. 392-394 , 2007
 
?
8

Trusted hardware : can it be trustworthy?:

, In: Proceedings of the 44th annual Design Automation Conference,
Irvine, Cynthia E. ; Levitt, Karl - p. 1-4 , 2007
 
?
9

DRETA : distributed routing evidence tracing and authent..:

, In: Proceedings of the 2nd ACM symposium on Information, computer and communications security,
 
?
10

A hybrid quarantine defense:

, In: Proceedings of the 2004 ACM workshop on Rapid malcode,
 
?
11

A specification-based intrusion detection system for AODV:

, In: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks,
 
?
12

A requires/provides model for computer attacks:

, In: Proceedings of the 2000 workshop on New security paradigms,
Templeton, Steven J. ; Levitt, Karl - p. 31-38 , 2001
 
?
14

Analysis of an algorithm for distributed recognition and ac..:

, In: Proceedings of the 1st ACM conference on Computer and communications security,
 
?
15

Report of evening session on hierarchical methods:

, In: Proceeding of ACM SIGPLAN - SIGOPS interface meeting on Programming languages - operating systems,
Levitt, Karl - p. 28-29 , 1973
 
1-15