default search action
John McHugh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c41]John McHugh, William Yurcik:
Position Paper: Personal Experience in the Technology Opportunities and Associated Risks of Healthcare Challenges in a Continuing Care Retirement Community (CCRC). HealthSec@CCS 2024: 113-124 - 2023
- [c40]Tracey John, Dwaine Clarke, Daniel Coore, Fabian Monrose, John McHugh:
Virtual Career Advisor System. MobiWIS 2023: 264-277
2010 – 2019
- 2017
- [j13]Sathya Chandran Sundaramurthy, Michael Wesch, Xinming Ou, John McHugh, S. Raj Rajagopalan, Alexandru G. Bardas:
Humans Are Dynamic - Our Tools Should Be Too. IEEE Internet Comput. 21(3): 40-46 (2017) - 2016
- [c39]Sathya Chandran Sundaramurthy, John McHugh, Xinming Ou, Michael Wesch, Alexandru G. Bardas, S. Raj Rajagopalan:
Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations. SOUPS 2016: 237-251 - 2015
- [c38]Sathya Chandran Sundaramurthy, Alexandru G. Bardas, Jacob Case, Xinming Ou, Michael Wesch, John McHugh, S. Raj Rajagopalan:
A Human Capital Model for Mitigating Security Analyst Burnout. SOUPS 2015: 347-359 - 2014
- [j12]Sathya Chandran Sundaramurthy, John McHugh, Xinming Simon Ou, S. Raj Rajagopalan, Michael Wesch:
An Anthropological Approach to Studying CSIRTs. IEEE Secur. Priv. 12(5): 52-60 (2014) - 2013
- [c37]Srinivas Krishnan, Teryl Taylor, Fabian Monrose, John McHugh:
Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing. DSN 2013: 1-12 - 2012
- [c36]Teryl Taylor, Scott E. Coull, Fabian Monrose, John McHugh:
Toward Efficient Querying of Compressed Network Payloads. USENIX ATC 2012: 113-124 - 2011
- [c35]Douglas A. Creager, John McHugh:
Verified workflow-based software development for infrastructure sensing and control applications. CSIIRW 2011: 18 - [c34]Erin Kenneally, Angelos Stavrou, John McHugh, Nicolas Christin:
Moving Forward, Building an Ethics Community (Panel Statements). Financial Cryptography Workshops 2011: 178-183 - 2010
- [c33]John McHugh, Teryl Taylor, Jeff Janies:
Cuckoo bags for exploring multikey data. CSIIRW 2010: 18 - [c32]Roy A. Maxion, Thomas A. Longstaff, John McHugh:
Why is there no science in cyber science?: a panel discussion at NSPW 2010. NSPW 2010: 1-6 - [c31]Wilson Lian, Fabian Monrose, John McHugh:
Traffic classification using visual motifs: an empirical evaluation. VizSEC 2010: 70-78
2000 – 2009
- 2009
- [j11]John McHugh:
Progressive Internal Waves of Permanent Form. SIAM J. Appl. Math. 70(4): 1017-1031 (2009) - [c30]John McHugh, Robert C. Armstrong, Thomas A. Longstaff, Daniel Quinlan, Frederick T. Sheldon, Deborah A. Frincke:
DOE grass roots panel. CSIIRW 2009: 11 - [c29]John McHugh:
Long term data storage issues for situational awareness. CSIIRW 2009: 14 - [c28]Joel Glanfield, Stephen Brooks, Teryl Taylor, Diana Paterson, Christopher Smith, Carrie Gates, John McHugh:
Over flow: An overview visualization for network analysis. VizSEC 2009: 11-19 - 2008
- [c27]Carrie Gates, John McHugh:
The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors. DIMVA 2008: 228-246 - [c26]Carlton R. Davis, Stephen Neville, José M. Fernandez, Jean-Marc Robert, John McHugh:
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?. ESORICS 2008: 461-480 - [c25]Carlton R. Davis, José M. Fernandez, Stephen Neville, John McHugh:
Sybil attacks as a mitigation strategy against the Storm botnet. MALWARE 2008: 32-40 - 2007
- [c24]Daniel Boteanu, Edouard Reich, José M. Fernandez, John McHugh:
Implementing and testing dynamic timeout adjustment as a dos counter-measure. QoP 2007: 34-39 - [c23]Daniel Boteanu, José M. Fernandez, John McHugh, John Mullins:
Queue Management as a DoS Counter-Measure? ISC 2007: 263-280 - [c22]Teryl Taylor, Stephen Brooks, John McHugh:
NetBytes Viewer: An Entity-Based NetFlow Visualization Utility for Identifying Intrusive Behavior. VizSEC 2007: 101-114 - 2006
- [c21]John McHugh:
Quality of protection: measuring the unmeasurable? QoP 2006: 1-2 - 2005
- [c20]John McHugh:
Software diversity: use of diversity as a defense mechanism. NSPW 2005: 19-20 - 2004
- [c19]John McHugh:
Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data. ESORICS 2004: 407-422 - 2003
- [c18]John McHugh, Carrie Gates:
Locality: a new paradigm for thinking about normal behavior and outsider threat. NSPW 2003: 3-10 - 2002
- [c17]Kymie M. C. Tan, John McHugh, Kevin S. Killourhy:
Hiding Intrusions: From the Abnormal to the Normal and Beyond. Information Hiding 2002: 1-17 - 2001
- [j10]Nancy R. Mead, Richard C. Linger, John McHugh, Howard F. Lipson:
Managing Software Development for Survivable Systems. Ann. Softw. Eng. 11(1): 45-78 (2001) - [j9]John McHugh:
Intrusion and intrusion detection. Int. J. Inf. Sec. 1(1): 14-35 (2001) - [c16]John McHugh:
An Information Flow Tool for Gypsy. ACSAC 2001: 191-201 - [c15]Hilary K. Browne, William A. Arbaugh, John McHugh, William L. Fithen:
A Trend Analysis of Exploitations. S&P 2001: 214-229 - 2000
- [j8]William A. Arbaugh, William L. Fithen, John McHugh:
Windows of Vulnerability: A Case Study Analysis. Computer 33(12): 52-59 (2000) - [j7]John McHugh, Alan M. Christie, Julia Allen:
Defending Yourself: The Role of Intrusion Detection Systems. IEEE Softw. 17(5): 42-51 (2000) - [j6]John McHugh:
Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans. Inf. Syst. Secur. 3(4): 262-294 (2000) - [c14]John McHugh:
The 1998 Lincoln Laboratory IDS Evaluation. Recent Advances in Intrusion Detection 2000: 145-161
1990 – 1999
- 1999
- [c13]John McHugh:
Chaffing at the Bit: Thoughts on a Note by Ronald Rivest. Information Hiding 1999: 395-404 - [c12]John McHugh, James Bret Michael:
Secure group management in large distributed systems: what is a group and what does it do? NSPW 1999: 80-85 - 1996
- [j5]John McHugh:
Guest Editorial: Introduction to the Special Section. IEEE Trans. Software Eng. 22(1): 3-5 (1996) - 1993
- [j4]Jeremy Epstein, John McHugh, Hilarie K. Orman, Rita Pascale, Ann B. Marmor-Squires, Bonnie P. Danner, Charles R. Martin, Martha A. Branstad, Glenn S. Benson, D. Rothnie:
A High Assurance Window System Prototype. J. Comput. Secur. 2(2-3): 159-190 (1993) - 1992
- [c11]A. H. Wadaa, Hussein M. Abdel-Wahab, John McHugh:
Heuristic authentication protocol for TCP/IP network applications under UNIX. ACM Southeast Regional Conference 1992: 61-68 - [c10]Charles W. Kurak Jr., John McHugh:
A cautionary note on image downgrading. ACSAC 1992: 153-159 - [c9]John McHugh:
Ada 9X and Safety Critical/Secure Systems. TRI-Ada 1992: 55-59 - [c8]Jeremy Epstein, John McHugh, Rita Pascale, Charles R. Martin, D. Rothnie, Hilarie K. Orman, Ann B. Marmor-Squires, Martha A. Branstad, Bonnie P. Danner:
Evolution of a trusted B3 window system prototype. S&P 1992: 226-239 - 1991
- [c7]Jeremy Epstein, John McHugh, Rita Pascale, Hilarie K. Orman, Glenn S. Benson, Charles R. Martin, Ann B. Marmor-Squires, Bonnie P. Danner, Martha A. Branstad:
A prototype B3 trusted X Window System. ACSAC 1991: 44-55
1980 – 1989
- 1989
- [c6]Ann B. Marmor-Squires, John McHugh, Martha A. Branstad, Bonnie P. Danner, Lou Nagy, Pat Rougeau, Daniel F. Sterne:
A risk driven process model for the development of trusted systems. ACSAC 1989: 184-192 - 1988
- [j3]John McHugh, Bhavani M. Thuraisingham:
Multilevel security issues in distributed database management systems. Comput. Secur. 7(4): 387-396 (1988) - [c5]John McHugh:
A Formal Definition for Information Flow in the Gypsy Expression Language. CSFW 1988: 147-165 - 1987
- [j2]J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Trans. Software Eng. 13(2): 157-168 (1987) - [c4]William D. Young, John McHugh:
Coding for a Believable Specification to Implementation Mapping. S&P 1987: 140-149 - 1986
- [c3]J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. S&P 1986: 14-24 - [c2]John McHugh, Andrew P. Moore:
A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area Network. S&P 1986: 34-39 - 1985
- [j1]John McHugh, Karl A. Nyberg:
Ada verification using existing tools. ACM SIGSOFT Softw. Eng. Notes 10(4): 104-106 (1985) - [c1]John McHugh, Donald L. Good:
An Information Flow Tool for Gypsy. S&P 1985: 46-48
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint