<?xml version="1.0"?>
<dblpperson name="Larry A. Clough" pid="85/250" n="5">
<person key="homepages/85/250" mdate="2009-06-08">
<author pid="85/250">Larry A. Clough</author>
</person>
<r><inproceedings key="conf/ccs/ReynoldsC03" mdate="2022-06-03">
<author pid="40/3940">James C. Reynolds</author>
<author pid="85/250">Larry A. Clough</author>
<title>Continual repair for windows using the event log.</title>
<pages>99-104</pages>
<year>2003</year>
<booktitle>SSRS@CCS</booktitle>
<ee>https://doi.org/10.1145/1036921.1036932</ee>
<crossref>conf/ccs/2003ssrs</crossref>
<url>db/conf/ccs/ssrs2003.html#ReynoldsC03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hicss/ReynoldsJCM03" mdate="2023-03-24">
<author pid="40/3940">James C. Reynolds</author>
<author pid="70/4749">James E. Just</author>
<author pid="85/250">Larry A. Clough</author>
<author pid="77/2629">Ryan Maglich</author>
<title>On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization.</title>
<pages>335</pages>
<year>2003</year>
<crossref>conf/hicss/2003</crossref>
<booktitle>HICSS</booktitle>
<ee>https://doi.org/10.1109/HICSS.2003.1174911</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/HICSS.2003.1174911</ee>
<url>db/conf/hicss/hicss2003.html#ReynoldsJCM03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/ReynoldsJLCM02" mdate="2003-08-27">
<author pid="40/3940">James C. Reynolds</author>
<author pid="70/4749">James E. Just</author>
<author pid="37/6124">Ed Lawson</author>
<author pid="85/250">Larry A. Clough</author>
<author pid="77/2629">Ryan Maglich</author>
<title>On-line Intrusion Protection by Detecting Attacks with Diversity.</title>
<pages>245-256</pages>
<year>2002</year>
<crossref>conf/dbsec/2002</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec2002.html#ReynoldsJLCM02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dsn/ReynoldsJLCML02" mdate="2023-03-24">
<author pid="40/3940">James C. Reynolds</author>
<author pid="70/4749">James E. Just</author>
<author pid="37/6124">Ed Lawson</author>
<author pid="85/250">Larry A. Clough</author>
<author pid="77/2629">Ryan Maglich</author>
<author pid="l/KarlNLevitt">Karl N. Levitt</author>
<title>The Design and Implementation of an Intrusion Tolerant System.</title>
<pages>285-292</pages>
<year>2002</year>
<crossref>conf/dsn/2002</crossref>
<booktitle>DSN</booktitle>
<ee>https://doi.org/10.1109/DSN.2002.1028912</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DSN.2002.1028912</ee>
<url>db/conf/dsn/dsn2002.html#ReynoldsJLCML02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/raid/JustRCDLMR02" mdate="2019-08-08">
<author pid="70/4749">James E. Just</author>
<author pid="40/3940">James C. Reynolds</author>
<author pid="85/250">Larry A. Clough</author>
<author pid="35/5469">Melissa Danforth</author>
<author pid="l/KarlNLevitt">Karl N. Levitt</author>
<author pid="77/2629">Ryan Maglich</author>
<author pid="22/3946">Jeff Rowe</author>
<title>Learning Unknown Attacks - A Start.</title>
<pages>158-176</pages>
<year>2002</year>
<crossref>conf/raid/2002</crossref>
<booktitle>RAID</booktitle>
<ee>https://doi.org/10.1007/3-540-36084-0_9</ee>
<url>db/conf/raid/raid2002.html#JustRCDLMR02</url>
</inproceedings>
</r>
<coauthors n="7" nc="1">
<co c="0"><na f="d/Danforth:Melissa" pid="35/5469">Melissa Danforth</na></co>
<co c="0"><na f="j/Just:James_E=" pid="70/4749">James E. Just</na></co>
<co c="0"><na f="l/Lawson:Ed" pid="37/6124">Ed Lawson</na></co>
<co c="0"><na f="l/Levitt:Karl_N=" pid="l/KarlNLevitt">Karl N. Levitt</na></co>
<co c="0"><na f="m/Maglich:Ryan" pid="77/2629">Ryan Maglich</na></co>
<co c="0"><na f="r/Reynolds:James_C=" pid="40/3940">James C. Reynolds</na></co>
<co c="0"><na f="r/Rowe:Jeff" pid="22/3946">Jeff Rowe</na></co>
</coauthors>
</dblpperson>

