WPI Worcester Polytechnic Institute










WPI Worcester Polytechnic Institute

Computer Science Department

WPI Secure Systems Research Laboratory



Books |Research Papers | Other Online Resources






  • WSSRL-TR-0301(pdf)  : "Applying Byzantine Agreement Protocols to the Intrusion Detection Problem in Distributed Systems", Colon Osorio, Fernando C. and Xiaoning Wang, WSSRL Technical Report -0301, January 2003.

  • The National Strategy To Secure CyberSpace, Draft, September 2002, Clarke, Richard A, Chair.

  •  “S.A.F.E. – Secure Architecture & Fail-Safe Engine for Intrusion Detection”, Colon Osorio, F.C., Technical Report, ACG-TR017, Acumen Consulting Group, August 2002.

  • “The 1999 DARPA Off-Line Detection Evaluation”, Lippmann, Richard, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das.

  • “Intrusion Detection Using Autonomous agents”, Spafford, Eugene H., Diego Zamboni, Computer Networks 34 (2000), pp. 547-570.

  • PKCS Editor, “PKS #1 v2.1 : “A New Cryptography Standard”, RSA Laboratories”, June 14, 2002.

  •   “NTRU - A Ring-Based Public Key Cryptosystem”, Hoffstein, Jeffrey et. al., ANTS 1998, pp. 267-288.

  •   "An efficient optimal normal basis type II multiplier", ] B. Sunar and C. K. Koc. IEEE Transactions on Computers, 50(1): 83-87, January 2001.

  •   “Bit Permutation Instructions for Accelerating Software Cryptography”.   Zhijie Shi and Ruby Lee.,Proceedings of the IEEE International Conference on Application-specific Systems, Architectures and Processors, pp. 138-148. July 2000.

  •   “A New Approach to Security Processing (SSL and Ipsec)”, Jain, Anil, VP of Engineering and Co-Founder of Cavium Networks, Technical Presentation at WPI CS Research Colloquium, November 2002.

  • “State of the Practice of Intrusion Detection Technologies, Allen, Julia et.al., Technical Report CMU/SEI-99-TR-028 ESC-99-102.

  •   “An Intrusion Detection Model”, Denning, Dorothy E., IEEE Transactions On Software Engineering, No.2, pp 222, February 1987.

  •   Cautionary Tales: Stealth Coordinated Attack HOWTO [online]. Ruiu, Dragos. Available at WWW:<URL:http://www.nswc.navy.mil/ISSEC/CID/Stealth_Coordinated_Attack.html> (1999).

  • COAST Laboratory Technical Report 98/05, Balasubramaniyan, J.S., Jose Omar Garcia-Fernandez, David Isacoff, Eugene Spafford, and Diego Zamboni,

  •   “Bro: A System for Detecting Network Intruders in real-Time, V. Paxson, Computer Networks, 31(23-24), pp. 2435-2463, 14 Dec. 1999.

  • “Meta-learning in distributed data mining systems: Issues and Approaches”, "Advances of Distributed Data Mining" book,  Prodromidis et.al.,editors Hillol Kargupta and Philip Chan, AAAI press, August 2000.

  •  “Extending the DARPA Off-Line Intrusion Detection Evaluations”, Haines, Joshua W., Lee M. Rossey, Richard P. Lippmann, and Robert K. Cunningham,  Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEXP11’0’1)

  • “A core calculus of de-pendency”. M. Abadi, A. Banerjee, N. Heintze, and J. Riecke, In Proc. ACM Symposium on Principles of Programming Languages, pages 147–160, January 1999.

  • “Secure information or and pointer confinement in a Java-like language”, A. Banerjee and D. A. Naumann. In Proc. IEEE Computer Security Foundations Workshop, pages 253–267, June 2002.

  • “Static analysis of processes for no read-up and no write-down”. C. Bodei, P. Degano, F. Nielson, and H. Riis Nielson. In Proc. Foundations of Software Science and Computation Structure, number 1578 in LNCS, pages 120–134. Springer-Verlag, April 1999.

  • “Security analysis using flow logics”, C. Bodei, P. Degano, H. Riis Nielson, and F. Nielson.  In G. Paun, G. Rozenberg, and A. Salomaa, editors, Current Trends in Theoretical Computer Science, pages 525–542. World Scientific, 2000.

  • “A unified lattice model for static analysis of programs by construction or approximation of fix-points”. P. Cousot and R. Cousot. Abstract interpretation. In Proc. ACM Symposium on Principles of Programming Languages, pages 238–252, January 1977.



Practical Hints on Secure Programming

Memory Safety in an Imperfect World


Mobile Code

Other Resources

Language Support for Secure Programming


General AI

  • CMU Artificial Intelligence Repository
  • AI Journals
  • Challenge Problems for Artificial Intelligence
  • "Artificial Intelligence: A Modern Approach". S. Russell, P. Norvig. Prentice Hall, 1995. ISBN 0-13-103805-2
  • "Artificial Intelligence: Theory and Practice". T. Dean, J. Allen, Y. Aloimonos. The Benjamin/Cummings Publishing Company, Inc. 1995.
  • "Readings in Artificial Intelligence". B. L. Webber, N. J. Nilsson, eds. Tioga Publishing Company, 1981.
  • "Artificial Intelligence". 3rd edition. Patrick H. Winston. Addison Wesley.
  • "The Elements of Artificial Intelligence Using Common Lisp". S. L. Tanimoto. Computer Science Press 1990.
  • "Artificial Intelligence" Second edition. E. Rich and K. Knight. McGraw Hill 1991.
  • "Paradigms of Artificial Intelligence Programming: Case Studies in Common Lisp". P. Norvig. Morgan Kaufmann Publishers, 1992.
  • "Essentials of Artificial Intelligence". M. Ginsberg. Morgan Kaufmann Publishers, 1993.
  • "Artificial Intelligence Structures and Strategies for Complex Problem Solving". Third edition. G. F. Luger and W. A. Stubblefield. Addison-Wesley, 1998.
  • "Logical Foundations of Artificial Intelligence". M.R. Genesereth and N. Nilsson. Morgan Kaufmann, 1987.

Machine Learning



  • CMU's StatLib
  • Universiteit van Amsterdam
  • "Statistical Inference for Management and Economics". P. Billingsley, D. Croft, D. Huntsberger, C. Watson. Boston: Allyn and Bacon, Inc. 1986.
  • "Probability and Statistics". 2nd edition. M. DeGroot. Addison Wesley, 1986.
  • "Statistical Inference". G. Casella, R. Berger. Wadsworth and Brooks/Cole, 1990.


[Return to the WPI Homepage]  [Return to the CS Homepage]