Follow
Vipin Swarup
Vipin Swarup
Verified email at mitre.org
Title
Cited by
Cited by
Year
Moving target defense: creating asymmetric uncertainty for cyber threats
S Jajodia, AK Ghosh, V Swarup, C Wang, XS Wang
Springer Science & Business Media, 2011
6262011
Security for mobile agents: Authentication and state appraisal
WM Farmer, JD Guttman, V Swarup
Computer Security—ESORICS 96: 4th European Symposium on Research in …, 1996
4291996
Security for mobile agents: Issues and requirements
WM Farmer, JD Guttman, V Swarup
Proceedings of the 19th national information systems security conference 2 …, 1996
3901996
A weakest-adversary security metric for network configuration security analysis
J Pamula, S Jajodia, P Ammann, V Swarup
Proceedings of the 2nd ACM workshop on Quality of protection, 31-38, 2006
2332006
Fingerprinting relational databases: Schemes and specialties
Y Li, V Swarup, S Jajodia
IEEE Transactions on Dependable and Secure Computing 2 (1), 34-45, 2005
2062005
Cyber situational awareness
S Jajodia, P Liu, V Swarup, C Wang
Springer US, 2009
1952009
Cyber SA: Situational awareness for cyber defense
P Barford, M Dacier, TG Dietterich, M Fredrikson, J Giffin, S Jajodia, S Jha, ...
Cyber Situational Awareness: Issues and Research, 3-13, 2010
1932010
Authentication for mobile agents
S Berkovits, JD Guttman, V Swarup
Mobile agents and security, 114-136, 1998
1641998
Moving Target Defense II: Application of Game Theory and Adversarial Modeling
S Jajodia, AK Ghosh, VS Subrahmanian, V Swarup, C Wang, XS Wang
Springer Science & Business Media, 2012
1322012
Assignments for applicative languages
V Swarup, US Reddy, E Ireland
Functional Programming Languages and Computer Architecture: 5th ACM …, 1991
971991
Cyber deception
S Jajodia, V Subrahmanian, V Swarup, C Wang
Springer 1, 2.1, 2016
862016
Cyber deception
S Jajodia, V Subrahmanian, V Swarup, C Wang
Springer 1, 2.1, 2016
862016
Constructing a virtual primary key for fingerprinting relational data
Y Li, V Swarup, S Jajodia
Proceedings of the 3rd ACM workshop on Digital rights management, 133-141, 2003
852003
Moving target defense ii
S Jajodia, AK Ghosh, V Subrahmanian, V Swarup, C Wang, XS Wang
Application of game Theory and Adversarial Modeling. Series: Advances in …, 2013
412013
The VLISP verified scheme system
JD Guttman, JD Ramsdell, V Swarup
Lisp and Symbolic Computation 8 (1), 33-110, 1995
391995
Cyber warfare: building the scientific foundation
S Jajodia, P Shakarian, VS Subrahmanian, V Swarup, C Wang
Springer, 2015
362015
A robust watermarking scheme for relational data
Y Li, V Swarup, S Jajodia
Proceedings of the Workshop on Information Technology and Systems (WITS …, 2003
362003
Trust appraisal and secure routing of mobile agents
V Swarup
DARPA Workshop on Foundations for Secure Mobile Code, Monterey, CA, USA, 1997
331997
Everybody share: The challenge of data-sharing systems
K Smith, L Seligman, V Swarup
Computer 41 (9), 54-61, 2008
312008
A data sharing agreement framework
V Swarup, L Seligman, A Rosenthal
International Conference on Information Systems Security, 22-36, 2006
262006
The system can't perform the operation now. Try again later.
Articles 1–20