Citation Impact

Citing Papers

Assertion-oriented automated test data generation
1996
Electrical considerations in the computer aided design of logic circuit interconnections
1973
State-of-the-art in artificial neural network applications: A survey
2018 Standout
Singularity: Scientific containers for mobility of compute
2017 Standout
Structured One-Class Classification
2006
Survey of Clustering Algorithms
2005 Standout
Software-Defined Networking: A Comprehensive Survey
2014 Standout
Automated test data generation for programs with procedures
1996
Future Intelligent and Secure Vehicular Network Toward 6G: Machine-Learning Approaches
2019 Standout
Software quality assurance: Testing and validation
1980 StandoutNobel
Mitigating denial of service attacks: A tutorial
2005
Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey
2018 Standout
Internet time synchronization: the network time protocol
1991 Standout
A Survey of SIP Authentication and Key Agreement Schemes
2013 Standout
Ultracomputers
1980
The way forward for unifying dynamic test-case generation: The optimisation-based approach
1998
Deep Learning Approach for Intelligent Intrusion Detection System
2019 Standout
Representations for Rigid Solids: Theory, Methods, and Systems
1980 Standout
Production rules as a representation for a knowledge-based consultation program☆
1977
A survey of techniques for internet traffic classification using machine learning
2008 Standout
Unreliable failure detectors for reliable distributed systems
1996 Standout
Protecting privacy using the decentralized label model
2000
Information Processing Models of Cognition
1979 StandoutNobel
Internet of things and supply chain management: a literature review
2017 Standout
The dynamic domain reduction procedure for test data generation
1999
Symbolic execution and program testing
1976 Standout
Design and verification of secure systems
1981
An Algorithm for Subgraph Isomorphism
1976 Standout
A lattice model of secure information flow
1976 Standout
Cyber–Physical System Security for the Electric Power Grid
2011 Standout
A data mining framework for building intrusion detection models
2003
Incentive-based modeling and inference of attacker intent, objectives, and strategies
2005
Petri nets: Properties, analysis and applications
1989 Standout
An automated framework for structural test-data generation
2002
Wireless Communication Technologies for Safe Cooperative Cyber Physical Systems
2018 Standout
The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods
2009 Standout
Implementing fault-tolerant services using the state machine approach: a tutorial
1990 Standout
Safe cooperative CPS: A V2I traffic management scenario in the SafeCOP project
2016
A survey of trust in internet applications
2000 Standout
Artificial Neural Networks for Misuse Detection
1998
Verification and validation of simulation models
1995 Standout
Clock Synchronization in Distributed Real-Time Systems
1987
Dynamic verification of operating system decisions
1973
Recent directions in netlist partitioning: a survey
1995
Vision, applications and future challenges of Internet of Things
2016
Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference
1988 Standout
Automated test-data generation for exception conditions
2000
Collaboration Processes: Inside the Black Box
2006 Standout
Validation, Verification, and Testing of Computer Software
1982
Automating Linguistics-Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communications
2004
The protection of information in computer systems
1975 Standout
Practical byzantine fault tolerance and proactive recovery
2002 Standout
A methodology for testing intrusion detection systems
1996
An Efficient Unification Algorithm
1982
Synchronizing clocks in the presence of faults
1985
Meta-rules: Reasoning about control
1980
V2I Cooperation for Traffic Management with SafeCop
2016
Two Algorithms for Determining Volumes of Convex Polyhedra
1979
On the Automated Generation of Program Test Data
1976
A framework for constructing features and models for intrusion detection systems
2000
Automatic Generation of Floating-Point Test Data
1976
Intrusion detection via system call traces
1997
The Byzantine Generals Problem
1982 Standout
Characterization of defense mechanisms against distributed denial of service attacks
2004
Consumer Perceptions of Price, Quality, and Value: A Means-End Model and Synthesis of Evidence
1988 Standout
Equivalent Circuit Models for Three-Dimensional Multiconductor Systems
1974 Standout
Formal Models for Computer Security
1981
Reaching Agreement in the Presence of Faults
1980
A survey of rollback-recovery protocols in message-passing systems
2002 Standout
Issues and challenges in securing VoIP
2009
The enforcement of security policies for computation
1975
Automated software test data generation
1990
Towards a taxonomy of intrusion-detection systems
1999
An experimental implementation of the kernel/domain architecture
1973
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
2013 Standout
Deciding Linear Inequalities by Computing Loop Residues
1981
Anomaly detection
2009 Standout
Dynamic method for software test data generation
1992
Asynchronous Control Arrays
1974
A System to Generate Test Data and Symbolically Execute Programs
1976
Authentication and Supervision: A Survey of User Attitudes
2000
Software Design Representation Using Abstract Process Networks
1980
High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning
2016 Standout
The chaining approach for software test data generation
1996
Access and Alignment of Data in an Array Processor
1975 Standout
Fail-stop processors
1983
Intrusion detection system: A comprehensive review
2012 Standout
A bridging model for parallel computation
1990 Standout
A Domain Strategy for Computer Program Testing
1980
Planning for conjunctive goals
1987 Standout
Enhancing Secrecy With Multiantenna Transmission in Millimeter Wave Vehicular Communication Systems
2017
Power System Control Centers: Past, Present, and Future
2005 Standout
Accurate shellcode recognition from network traffic data using artificial neural nets
2015
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
2009
Temporal constraint networks
1991 Standout
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
2015 Standout
Impossibility of distributed consensus with one faulty process
1985 Standout
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
2008 Standout
Search‐based software test data generation: a survey
2004 Standout
On the security of public key protocols
1983 Standout
Bro: a system for detecting network intruders in real-time
1999 Standout
Analysis of Dimensionality Reduction Techniques on Big Data
2020 Standout
Definitions of Demand Flexibility for Aggregate Residential Loads
2016
Test-data generation using genetic algorithms
1999
Using Time Instead of Timeout for Fault-Tolerant Distributed Systems.
1984

Works of Karl Levitt being referenced

Software development and proofs of multi-level security
1976
Security vulnerabilities of connected vehicle streams and their impact on cooperative driving
2015
An example of hierarchical design and proof
1978
Cellular arrays for the solution of graph problems
1972
Module Clustering to Minimize Delay in Digital Networks
1969
An Assessment of Techniques for Proving Program Correctness
1972
Reduced-Order Load Models for Large Populations of Flexible Appliances
2014
SIFT: Design and analysis of a fault-tolerant computer for aircraft control
1978
A Provably Secure Operating System.
1975
Proving multilevel security of a system design
1977
Reasoning about programs
1974
Cellular Interconnection Arrays
1968
SELECT—a formal system for testing and debugging programs by symbolic execution
1975
Network intrusion detection
1994
Rankless by CCL
2026