Follow
John McHugh
John McHugh
Adjunct Professor of Computer Science, University of North Carolina
Verified email at cs.unc.edu
Title
Cited by
Cited by
Year
Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
J McHugh
ACM Transactions on Information and System Security (TISSEC) 3 (4), 262-294, 2000
18492000
State of the practice of intrusion detection technologies
J Allen, A Christie, W Fithen, J McHugh, J Pickel
(No Title), 2000
7142000
Windows of vulnerability: A case study analysis
WA Arbaugh, WL Fithen, J McHugh
Computer 33 (12), 52-59, 2000
4362000
Defending yourself: The role of intrusion detection systems
J McHugh, A Christie, J Allen
IEEE software 17 (5), 42-51, 2000
4132000
Intrusion and intrusion detection
J McHugh
International Journal of Information Security 1, 14-35, 2001
3432001
A cautionary note on image downgrading.
CW Kurak Jr, J McHugh
ACSAC, 153-159, 1992
3071992
Survivable network analysis method
NR Mead, RJ Ellison, RC Linger, T Longstaff, J McHugh
CMU/SEI, 2000
1672000
A trend analysis of exploitations
HK Browne, WA Arbaugh, J McHugh, WL Fithen
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 214-229, 2000
1572000
The 1998 Lincoln laboratory IDS evaluation: a critique
J McHugh
Recent Advances in Intrusion Detection: Third International Workshop, RAID …, 2000
1452000
A human capital model for mitigating security analyst burnout
SC Sundaramurthy, AG Bardas, J Case, X Ou, M Wesch, J McHugh, ...
Eleventh symposium on usable privacy and security (SOUPS 2015), 347-359, 2015
1082015
An experience using two covert channel analysis techniques on a real system design
JT Haigh, RA Kemmerer, J McHugh, WD Young
IEEE Transactions on Software Engineering, 157-168, 1987
941987
Sybil attacks as a mitigation strategy against the storm botnet
CR Davis, JM Fernandez, S Neville, J McHugh
2008 3rd International Conference on Malicious and Unwanted Software …, 2008
902008
Hiding intrusions: From the abnormal to the normal and beyond
K Tan, J McHugh, K Killourhy
Information Hiding: 5th International Workshop, IH 2002 Noordwijkerhout, The …, 2003
882003
Flovis: Flow visualization system
T Taylor, D Paterson, J Glanfield, C Gates, S Brooks, J McHugh
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
852009
Turning contradictions into innovations or: How we learned to stop whining and improve security operations
SC Sundaramurthy, J McHugh, X Ou, M Wesch, AG Bardas, ...
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 237-251, 2016
842016
Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?
CR Davis, S Neville, JM Fernandez, JM Robert, J McHugh
Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008
652008
Quality of protection: Measuring the unmeasurable?
J McHugh
Proceedings of the 2nd ACM workshop on Quality of protection, 1-2, 2006
542006
Business representation in the UK since 1979: the case of trade associations
TC May, J McHugh, T Taylor
Political Studies 46 (2), 260-275, 1998
531998
An anthropological approach to studying CSIRTs
SC Sundaramurthy, J McHugh, XS Ou, SR Rajagopalan, M Wesch
IEEE Security & Privacy 12 (5), 52-60, 2014
492014
Life-cycle models for survivable systems
RC Linger, HF Lipson, J McHugh, NR Mead, CA Sledge
CMU Software Engineering Institute, CMU/SEI-2002-TR-026, 2002
462002
The system can't perform the operation now. Try again later.
Articles 1–20