What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
John McHugh
Google Scholar
26
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/nspw
"Function Extraction: A New Paradigm for Producing Secure Code".
Richard C. Linger
Mark G. Pleszkoch
Jack McGaughey
John McHugh
Wided Ghardallou
Ali Mili
2016
conf/soups
Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations.
Sathya Chandran Sundaramurthy
John McHugh
Xinming Ou
Michael Wesch
Alexandru G. Bardas
S. Raj Rajagopalan
2015
conf/soups
A Human Capital Model for Mitigating Security Analyst Burnout.
Sathya Chandran Sundaramurthy
Alexandru G. Bardas
Jacob Case
Xinming Ou
Michael Wesch
John McHugh
S. Raj Rajagopalan
2013
conf/dsn
Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing.
Srinivas Krishnan
Teryl Taylor
Fabian Monrose
John McHugh
2011
conf/fc
Moving Forward, Building an Ethics Community (Panel Statements).
Erin Kenneally
Angelos Stavrou
John McHugh
Nicolas Christin
2010
conf/nspw
Why is there no science in cyber science?: a panel discussion at NSPW 2010.
Roy A. Maxion
Thomas A. Longstaff
John McHugh
2008
conf/esorics
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?.
Carlton R. Davis
Stephen Neville
José M. Fernandez
Jean-Marc Robert
John McHugh
2007
conf/ccs
Implementing and testing dynamic timeout adjustment as a dos counter-measure.
Daniel Boteanu
Edouard Reich
José M. Fernandez
John McHugh
2006
conf/ccs
Quality of protection: measuring the unmeasurable?
John McHugh
2005
conf/nspw
.
John McHugh
2004
conf/esorics
Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data.
John McHugh
2003
conf/nspw
Locality: a new paradigm for thinking about normal behavior and outsider threat.
John McHugh
Carrie Gates
2002
conf/ih
Hiding Intrusions: From the Abnormal to the Normal and Beyond.
Kymie M. C. Tan
John McHugh
Kevin S. Killourhy
2001
conf/sp
A Trend Analysis of Exploitations.
Hilary K. Browne
William A. Arbaugh
John McHugh
William L. Fithen
2001
conf/acsac
An Information Flow Tool for Gypsy.
John McHugh
1999
conf/nspw
Secure group management in large distributed systems: what is a group and what does it do?
John McHugh
James Bret Michael
1999
conf/ih
Chaffing at the Bit: Thoughts on a Note by Ronald Rivest.
John McHugh
1992
conf/sp
Evolution of a trusted B3 window system prototype.
Jeremy Epstein
John McHugh
Rita Pascale
Charles R. Martin
D. Rothnie
Hilarie K. Orman
Ann B. Marmor-Squires
Martha A. Branstad
Bonnie P. Danner
1992
conf/acsac
A cautionary note on image downgrading.
Charles W. Kurak Jr.
John McHugh
1991
conf/acsac
A prototype B3 trusted X Window System.
Jeremy Epstein
John McHugh
Rita Pascale
Hilarie K. Orman
Glenn S. Benson
Charles R. Martin
Ann B. Marmor-Squires
Bonnie P. Danner
Martha A. Branstad
1989
conf/acsac
A risk driven process model for the development of trusted systems.
Ann B. Marmor-Squires
John McHugh
Martha A. Branstad
Bonnie P. Danner
Lou Nagy
Pat Rougeau
Daniel F. Sterne
1988
journals/compsec
Multilevel security issues in distributed database management systems.
John McHugh
Bhavani M. Thuraisingham
1987
conf/sp
Coding for a Believable Specification to Implementation Mapping.
William D. Young
John McHugh
1986
conf/sp
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
J. Thomas Haigh
Richard A. Kemmerer
John McHugh
William D. Young
1986
conf/sp
A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area Network.
John McHugh
Andrew P. Moore
1985
conf/sp
An Information Flow Tool for Gypsy.
John McHugh
Donald L. Good
Coauthors
Alexandru G. Bardas
(2)
Ali Mili
(1)
Andrew P. Moore
(1)
Angelos Stavrou
(1)
Ann B. Marmor-Squires
(3)
Bhavani M. Thuraisingham
(1)
Bonnie P. Danner
(3)
Carlton R. Davis
(1)
Carrie Gates
(1)
Charles R. Martin
(2)
Charles W. Kurak Jr.
(1)
D. Rothnie
(1)
Daniel Boteanu
(1)
Daniel F. Sterne
(1)
Donald L. Good
(1)
Edouard Reich
(1)
Erin Kenneally
(1)
Fabian Monrose
(1)
Glenn S. Benson
(1)
Hilarie K. Orman
(2)
Hilary K. Browne
(1)
J. Thomas Haigh
(1)
Jack McGaughey
(1)
Jacob Case
(1)
James Bret Michael
(1)
Jean-Marc Robert
(1)
Jeremy Epstein
(2)
John McHugh
(26)
José M. Fernandez
(2)
Kevin S. Killourhy
(1)
Kymie M. C. Tan
(1)
Lou Nagy
(1)
Mark G. Pleszkoch
(1)
Martha A. Branstad
(3)
Michael Wesch
(2)
Nicolas Christin
(1)
Pat Rougeau
(1)
Richard A. Kemmerer
(1)
Richard C. Linger
(1)
Rita Pascale
(2)
Roy A. Maxion
(1)
S. Raj Rajagopalan
(2)
Sathya Chandran Sundaramurthy
(2)
Srinivas Krishnan
(1)
Stephen Neville
(1)
Teryl Taylor
(1)
Thomas A. Longstaff
(1)
Wided Ghardallou
(1)
William A. Arbaugh
(1)
William D. Young
(2)
William L. Fithen
(1)
Xinming Ou
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to