Follow
Richard Lippmann
Richard Lippmann
Laboratory Fellow, MIT Lincoln Laboratory
Verified email at ll.mit.edu
Title
Cited by
Cited by
Year
An introduction to computing with neural nets
RP Lippmann
ACM SIGARCH Computer Architecture News 16 (1), 7-25, 1988
129901988
Automated generation and analysis of attack graphs
O Sheyner, J Haines, S Jha, R Lippmann, JM Wing
Proceedings 2002 IEEE Symposium on Security and Privacy, 273-284, 2002
19132002
The 1999 DARPA off-line intrusion detection evaluation
R Lippmann, JW Haines, DJ Fried, J Korba, K Das
Computer networks 34 (4), 579-595, 2000
1687*2000
Neural Network Classifiers Estimate Bayesian a posteriori Probabilities
MD Richard, RP Lippmann
Neural computation 3 (4), 461-483, 1991
16341991
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
RP Lippmann, DJ Fried, I Graf, JW Haines, KR Kendall, D McClung, ...
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
14362000
Pattern classification using neural networks
RP Lippmann
IEEE communications magazine 27 (11), 47-50, 1989
12241989
Speech recognition by machines and humans
RP Lippmann
Speech communication 22 (1), 1-15, 1997
8801997
Review of neural networks for speech recognition
RP Lippmann
Neural computation 1 (1), 1-38, 1989
8761989
Practical attack graph generation for network defense
K Ingols, R Lippmann, K Piwowarski
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 121-130, 2006
5832006
Multi-style training for robust isolated-word speech recognition
R Lippmann, E Martin, D Paul
ICASSP'87. IEEE International Conference on Acoustics, Speech, and Signal …, 1987
4701987
Improving intrusion detection performance using keyword selection and neural networks
RP Lippmann, RK Cunningham
Computer networks 34 (4), 597-603, 2000
3922000
Testing static analysis tools using exploitable buffer overflows from open source code
M Zitser, R Lippmann, T Leek
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on …, 2004
3822004
Modeling modern network attacks and countermeasures using attack graphs
K Ingols, M Chu, R Lippmann, S Webster, S Boyer
2009 Annual Computer Security Applications Conference, 117-126, 2009
3402009
Validating and restoring defense in depth using attack graphs
R Lippmann, K Ingols, C Scott, K Piwowarski, K Kratkiewicz, M Artz, ...
MILCOM 2006-2006 IEEE Military Communications Conference, 1-10, 2006
3042006
Neural net and traditional classifiers
W Huang, RP Lippmann
Neural information processing systems, 1987
3001987
Network security planning architecture
R Lippmann, C Scott, K Kratkiewicz, M Artz, KW Ingols
US Patent 7,194,769, 2007
2942007
Comparisons between neural networks and conventional classifiers.
W Haung
Proc. IEEE, Int. Conf. on Neural Networks IV, 485-493, 1987
2931987
An annotated review of past papers on attack graphs
RP Lippmann, KW Ingols
Massachusetts Institute of Technology, Lincoln Laboratory 3, 32, 2005
2902005
Solving data mining problems through pattern recognition
RL Kennedy
(No Title), 1997
2681997
An overview of issues in testing intrusion detection systems
P Mell, V Hu, R Lippmann, J Haines, M Zissman
2302003
The system can't perform the operation now. Try again later.
Articles 1–20