| An introduction to computing with neural nets RP Lippmann ACM SIGARCH Computer Architecture News 16 (1), 7-25, 1988 | 13334 | 1988 |
| Automated generation and analysis of attack graphs O Sheyner, J Haines, S Jha, R Lippmann, JM Wing Proceedings 2002 IEEE Symposium on Security and Privacy, 273-284, 2002 | 2040 | 2002 |
| The 1999 DARPA off-line intrusion detection evaluation R Lippmann, JW Haines, DJ Fried, J Korba, K Das Computer networks 34 (4), 579-595, 2000 | 1820* | 2000 |
| Neural Network Classifiers Estimate Bayesian a posteriori Probabilities MD Richard, RP Lippmann Neural computation 3 (4), 461-483, 1991 | 1701 | 1991 |
| Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation RP Lippmann, DJ Fried, I Graf, JW Haines, KR Kendall, D McClung, ... Proceedings DARPA Information survivability conference and exposition …, 2000 | 1557 | 2000 |
| Pattern classification using neural networks RP Lippmann IEEE communications magazine 27 (11), 47-50, 1989 | 1283 | 1989 |
| Speech recognition by machines and humans RP Lippmann Speech communication 22 (1), 1-15, 1997 | 915 | 1997 |
| Review of neural networks for speech recognition RP Lippmann Neural computation 1 (1), 1-38, 1989 | 885 | 1989 |
| Practical attack graph generation for network defense K Ingols, R Lippmann, K Piwowarski 2006 22nd Annual computer security applications conference (ACSAC'06), 121-130, 2006 | 640 | 2006 |
| Multi-style training for robust isolated-word speech recognition R Lippmann, E Martin, D Paul ICASSP'87. IEEE International Conference on Acoustics, Speech, and Signal …, 1987 | 472 | 1987 |
| Testing static analysis tools using exploitable buffer overflows from open source code M Zitser, R Lippmann, T Leek Proceedings of the 12th ACM SIGSOFT twelfth international symposium on …, 2004 | 399 | 2004 |
| Improving intrusion detection performance using keyword selection and neural networks RP Lippmann, RK Cunningham Computer networks 34 (4), 597-603, 2000 | 398 | 2000 |
| Modeling modern network attacks and countermeasures using attack graphs K Ingols, M Chu, R Lippmann, S Webster, S Boyer 2009 Annual Computer Security Applications Conference, 117-126, 2009 | 372 | 2009 |
| Validating and restoring defense in depth using attack graphs R Lippmann, K Ingols, C Scott, K Piwowarski, K Kratkiewicz, M Artz, ... MILCOM 2006-2006 IEEE military communications conference, 1-10, 2006 | 351 | 2006 |
| Network security planning architecture R Lippmann, C Scott, K Kratkiewicz, M Artz, KW Ingols US Patent 7,194,769, 2007 | 340 | 2007 |
| An annotated review of past papers on attack graphs RP Lippmann, KW Ingols Massachusetts Institute of Technology, Lincoln Laboratory 3, 32, 2005 | 307 | 2005 |
| Neural net and traditional classifiers WY Huang, RP Lippmann Neural information processing systems, 1987 | 305 | 1987 |
| Comparisons between neural networks and conventional classifiers. W Haung Proc. IEEE, Int. Conf. on Neural Networks IV, 485-493, 1987 | 294 | 1987 |
| Solving data mining problems through pattern recognition RL Kennedy, Y Lee, B Van Roy, CD Reed, RP Lippmann Upper Saddle River: Prentice-Hall,, 1997 | 272 | 1997 |
| An overview of issues in testing intrusion detection systems P Mell, V Hu, R Lippmann, J Haines, M Zissman | 243 | 2003 |