Karl Levitt

Affiliations: 
University of California, Davis, Davis, CA 
Area:
Computer Science
Google:
"Karl Levitt"

Children

Sign in to add trainee
Steven Cheung grad student 1999 UC Davis
Mark R. Heckman grad student 2000 UC Davis
Marcus A. Tylutki grad student 2005 UC Davis
Melissa Danforth grad student 2006 UC Davis
Chin-Yang H. Tseng grad student 2006 UC Davis
Senthilkumar G. Cheetancheri grad student 2007 UC Davis
Lynette Q. Nguyen grad student 2010 UC Davis
Sisi Duan grad student 2014 UC Davis
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Duan S, Peisert S, Levitt KN. (2015) Hbft: Speculative Byzantine fault tolerance with minimum cost Ieee Transactions On Dependable and Secure Computing. 12: 58-70
Cheetancheri SG, Agosta JM, Levitt KN, et al. (2008) Optimal cost, collaborative, and distributed response to zero-day worms - A control theoretic approach Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5230: 231-250
Nguyen LQ, Demir T, Rowe J, et al. (2007) A framework for diversifying windows native APIs to tolerate code injection attacks Proceedings of the 2nd Acm Symposium On Information, Computer and Communications Security, Asiaccs '07. 392-394
Cheetancheri SG, Agosta JM, Dash DH, et al. (2006) A distributed host-based worm detection system Proceedings of the 2006 Sigcomm Workshop On Large-Scale Attack Defense, Lsad'06. 2006: 107-113
Cheetancheri SG, Ma DL, Levitt KN, et al. (2006) Towards a framework for worm-defense evaluation Conference Proceedings of the Ieee International Performance, Computing, and Communications Conference. 2006: 559-565
Tseng CH, Wang SH, Ko C, et al. (2006) DEMEM: Distributed Evidence-driven Message Exchange intrusion detection Model for MANET Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4219: 249-271
Balepin I, Maltsev S, Rowe J, et al. (2003) Using specification-based intrusion detection for automated response Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2820: 136-154
Just JE, Reynolds JC, Clough LA, et al. (2002) Learning unknown attacks - A start Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2516: 158-176
Heckman MR, Zhang C, Becker BR, et al. (1996) Towards applying the composition principle to verify a microkernel operating system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1125: 235-250
Zhang C, Becker BR, Heckman MR, et al. (1995) A hierarchical method for reasoning about distributed programming languages Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 971: 385-400
See more...