BibTeX records: Robert F. Erbacher

download as .bib file

@inproceedings{DBLP:conf/icmla/KhanAPRGWFBE23,
  author       = {Md. Azim Khan and
                  Nadeem Ahmed and
                  Joyce Padela and
                  Muhammad Shehrose Raza and
                  Aryya Gangopadhyay and
                  Jianwu Wang and
                  James Foulds and
                  Carl E. Busart and
                  Robert F. Erbacher},
  title        = {Flood-ResNet50: Optimized Deep Learning Model for Efficient Flood
                  Detection on Edge Device},
  booktitle    = {International Conference on Machine Learning and Applications, {ICMLA}
                  2023, Jacksonville, FL, USA, December 15-17, 2023},
  pages        = {512--519},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICMLA58977.2023.00077},
  doi          = {10.1109/ICMLA58977.2023.00077},
  timestamp    = {Tue, 02 Apr 2024 21:06:13 +0200},
  biburl       = {https://dblp.org/rec/conf/icmla/KhanAPRGWFBE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcomp/PutatundaKGWBE23,
  author       = {Rohan Putatunda and
                  Azim Khan and
                  Aryya Gangopadhyay and
                  Jianwu Wang and
                  Carl E. Busart and
                  Robert F. Erbacher},
  title        = {Vision Transformer-based Real-Time Camouflaged Object Detection System
                  at Edge},
  booktitle    = {2023 {IEEE} International Conference on Smart Computing, {SMARTCOMP}
                  2023, Nashville, TN, USA, June 26-30, 2023},
  pages        = {90--97},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SMARTCOMP58114.2023.00029},
  doi          = {10.1109/SMARTCOMP58114.2023.00029},
  timestamp    = {Tue, 15 Aug 2023 09:17:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcomp/PutatundaKGWBE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmla/OviGEB22,
  author       = {Pretom Roy Ovi and
                  Aryya Gangopadhyay and
                  Robert F. Erbacher and
                  Carl E. Busart},
  editor       = {M. Arif Wani and
                  Mehmed M. Kantardzic and
                  Vasile Palade and
                  Daniel Neagu and
                  Longzhi Yang and
                  Kit Yan Chan},
  title        = {Secure Federated Training: Detecting Compromised Nodes and Identifying
                  the Type of Attacks},
  booktitle    = {21st {IEEE} International Conference on Machine Learning and Applications,
                  {ICMLA} 2022, Nassau, Bahamas, December 12-14, 2022},
  pages        = {1115--1120},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICMLA55696.2022.00183},
  doi          = {10.1109/ICMLA55696.2022.00183},
  timestamp    = {Wed, 29 Mar 2023 19:23:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icmla/OviGEB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-08801,
  author       = {Robert F. Erbacher},
  title        = {Base-Rate Fallacy Redux and a Deep Dive Review in Cybersecurity},
  journal      = {CoRR},
  volume       = {abs/2203.08801},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.08801},
  doi          = {10.48550/ARXIV.2203.08801},
  eprinttype    = {arXiv},
  eprint       = {2203.08801},
  timestamp    = {Mon, 28 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-08801.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-01703,
  author       = {Sai Sree Laya Chukkapalli and
                  Anupam Joshi and
                  Tim Finin and
                  Robert F. Erbacher},
  title        = {{CAPD:} {A} Context-Aware, Policy-Driven Framework for Secure and
                  Resilient IoBT Operations},
  journal      = {CoRR},
  volume       = {abs/2208.01703},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.01703},
  doi          = {10.48550/ARXIV.2208.01703},
  eprinttype    = {arXiv},
  eprint       = {2208.01703},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-01703.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DauberESWFG21,
  author       = {Edwin Dauber and
                  Robert F. Erbacher and
                  Gregory Shearer and
                  Michael J. Weisman and
                  Frederica Free{-}Nelson and
                  Rachel Greenstadt},
  title        = {Supervised Authorship Segmentation of Open Source Code Projects},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {4},
  pages        = {464--479},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0080},
  doi          = {10.2478/POPETS-2021-0080},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/DauberESWFG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ZhongYLE19,
  author       = {Chen Zhong and
                  John Yen and
                  Peng Liu and
                  Robert F. Erbacher},
  title        = {Learning From Experts' Experience: Toward Automated Cyber Security
                  Data Triage},
  journal      = {{IEEE} Syst. J.},
  volume       = {13},
  number       = {1},
  pages        = {603--614},
  year         = {2019},
  url          = {https://doi.org/10.1109/JSYST.2018.2828832},
  doi          = {10.1109/JSYST.2018.2828832},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/ZhongYLE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/0003HXZEJ019,
  author       = {Ping Chen and
                  Zhisheng Hu and
                  Jun Xu and
                  Minghui Zhu and
                  Rob Erbacher and
                  Sushil Jajodia and
                  Peng Liu},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  Peng Liu and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {{MTD} Techniques for Memory Protection Against Zero-Day Attacks},
  booktitle    = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control-
                  and Game-Theoretic Approaches to Cyber Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {11830},
  pages        = {129--155},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30719-6\_7},
  doi          = {10.1007/978-3-030-30719-6\_7},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/0003HXZEJ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/ZhongYLEGC17,
  author       = {Chen Zhong and
                  John Yen and
                  Peng Liu and
                  Robert F. Erbacher and
                  Christopher Garneau and
                  Bo Chen},
  editor       = {Peng Liu and
                  Sushil Jajodia and
                  Cliff Wang},
  title        = {Studying Analysts' Data Triage Operations in Cyber Defense Situational
                  Analysis},
  booktitle    = {Theory and Models for Cyber Situation Awareness},
  series       = {Lecture Notes in Computer Science},
  volume       = {10030},
  pages        = {128--169},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61152-5\_6},
  doi          = {10.1007/978-3-319-61152-5\_6},
  timestamp    = {Mon, 03 Jan 2022 21:52:37 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/ZhongYLEGC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenGXYECE16,
  author       = {Zhijiang Chen and
                  Linqiang Ge and
                  Guobin Xu and
                  Wei Yu and
                  Robert F. Erbacher and
                  Hasan Cam and
                  Nnanna Ekedebe},
  title        = {A threat monitoring system in enterprise networks with smart mobiles},
  journal      = {Int. J. Secur. Networks},
  volume       = {11},
  number       = {1/2},
  pages        = {66--81},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSN.2016.075073},
  doi          = {10.1504/IJSN.2016.075073},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenGXYECE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatasec/ZhongYLE16,
  author       = {Chen Zhong and
                  John Yen and
                  Peng Liu and
                  Robert F. Erbacher},
  title        = {Automate Cybersecurity Data Triage by Leveraging Human Analysts' Cognitive
                  Process},
  booktitle    = {2nd {IEEE} International Conference on Big Data Security on Cloud,
                  BigDataSecurity 2016, {IEEE} International Conference on High Performance
                  and Smart Computing, {HPSC} 2016, and {IEEE} International Conference
                  on Intelligent Data and Security, {IDS} 2016, New York, NY, USA, April
                  9-10, 2016},
  pages        = {357--363},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.41},
  doi          = {10.1109/BIGDATASECURITY-HPSC-IDS.2016.41},
  timestamp    = {Sun, 08 Aug 2021 01:40:50 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatasec/ZhongYLE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuGCECL16,
  author       = {Jun Xu and
                  Pinyao Guo and
                  Bo Chen and
                  Robert F. Erbacher and
                  Ping Chen and
                  Peng Liu},
  editor       = {Peng Liu and
                  Cliff Wang},
  title        = {Demo: {A} Symbolic N-Variant System},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Moving Target Defense, MTD@CCS
                  2016, Vienna, Austria, October 24, 2016},
  pages        = {65--68},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995272.2995284},
  doi          = {10.1145/2995272.2995284},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuGCECL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cogsima/ZhongYLEEG15,
  author       = {Chen Zhong and
                  John Yen and
                  Peng Liu and
                  Rob Erbacher and
                  Renee Etoty and
                  Christopher Garneau},
  title        = {{ARSCA:} a computer tool for tracing the cognitive processes of cyber-attack
                  analysis},
  booktitle    = {{IEEE} International Inter-Disciplinary Conference on Cognitive Methods
                  in Situation Awareness and Decision Support, CogSIMA 2015, Orlando,
                  FL, USA, March 9-12, 2015},
  pages        = {165--171},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/COGSIMA.2015.7108193},
  doi          = {10.1109/COGSIMA.2015.7108193},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cogsima/ZhongYLEEG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/ZhongY0EEG15,
  author       = {Chen Zhong and
                  John Yen and
                  Peng Liu and
                  Rob Erbacher and
                  Renee Etoty and
                  Christopher Garneau},
  editor       = {David M. Nicol},
  title        = {An integrated computer-aided cognitive task analysis method for tracing
                  cyber-attack analysis processes},
  booktitle    = {Proceedings of the 2015 Symposium and Bootcamp on the Science of Security,
                  HotSoS 2015, Urbana, IL, USA, April 21-22, 2015},
  pages        = {9:1--9:11},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746194.2746203},
  doi          = {10.1145/2746194.2746203},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotsos/ZhongY0EEG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ChengYCE15,
  author       = {Maggie X. Cheng and
                  Quanmin Ye and
                  Xiaochun Cheng and
                  Robert F. Erbacher},
  title        = {Network coding and coding-aware scheduling for multicast in wireless
                  networks},
  booktitle    = {2015 {IEEE} International Conference on Communications, {ICC} 2015,
                  London, United Kingdom, June 8-12, 2015},
  pages        = {5703--5708},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICC.2015.7249231},
  doi          = {10.1109/ICC.2015.7249231},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/ChengYCE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/BhattaraiWRYEC15,
  author       = {Sulabh Bhattarai and
                  Sixiao Wei and
                  Stephen Rook and
                  Wei Yu and
                  Robert F. Erbacher and
                  Hasan Cam},
  title        = {On simulation studies of jamming threats against {LTE} networks},
  booktitle    = {International Conference on Computing, Networking and Communications,
                  {ICNC} 2015, Garden Grove, CA, USA, February 16-19, 2015},
  pages        = {99--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICCNC.2015.7069323},
  doi          = {10.1109/ICCNC.2015.7069323},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccnc/BhattaraiWRYEC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stids/Ben-AsherOEG15,
  author       = {Noam Ben{-}Asher and
                  Alessandro Oltramari and
                  Robert F. Erbacher and
                  Cleotilde Gonzalez},
  editor       = {Kathryn Blackmond Laskey and
                  Ian Emmons and
                  Paulo C. G. Costa and
                  Alessandro Oltramari},
  title        = {Ontology-based Adaptive Systems of Cyber Defense},
  booktitle    = {Proceedings of the Tenth Conference on Semantic Technology for Intelligence,
                  Defense, and Security, Fairfax VA, USA, November 18-20, 2015},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1523},
  pages        = {34--41},
  publisher    = {CEUR-WS.org},
  year         = {2015},
  url          = {https://ceur-ws.org/Vol-1523/STIDS\_2015\_T05\_BenAsher\_etal.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:26 +0100},
  biburl       = {https://dblp.org/rec/conf/stids/Ben-AsherOEG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuGZEZL14,
  author       = {Jun Xu and
                  Pinyao Guo and
                  Mingyi Zhao and
                  Robert F. Erbacher and
                  Minghui Zhu and
                  Peng Liu},
  editor       = {Sushil Jajodia and
                  Kun Sun},
  title        = {Comparing Different Moving Target Defense Techniques},
  booktitle    = {Proceedings of the First {ACM} Workshop on Moving Target Defense,
                  {MTD} '14, Scottsdale, Arizona, USA, November 7, 2014},
  pages        = {97--107},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663474.2663486},
  doi          = {10.1145/2663474.2663486},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuGZEZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cogsima/ZhongSYLEHECG14,
  author       = {Chen Zhong and
                  Deepak Samuel and
                  John Yen and
                  Peng Liu and
                  Robert F. Erbacher and
                  Steve E. Hutchinson and
                  Renee Etoty and
                  Hasan Cam and
                  William Glodek},
  editor       = {Gabriel Jakobson and
                  Kristin E. Schaefer and
                  Mitch Kokar and
                  Ann M. Bisantz and
                  Tom Ziemke},
  title        = {RankAOH: Context-driven similarity-based retrieval of experiences
                  in cyber analysis},
  booktitle    = {{IEEE} International Inter-Disciplinary Conference on Cognitive Methods
                  in Situation Awareness and Decision Support, CogSIMA 2014, San Antonio,
                  TX, USA, March 3-6, 2014},
  pages        = {230--236},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CogSIMA.2014.6816567},
  doi          = {10.1109/COGSIMA.2014.6816567},
  timestamp    = {Sun, 13 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cogsima/ZhongSYLEHECG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/HuangZE14,
  author       = {Chu Huang and
                  Sencun Zhu and
                  Robert F. Erbacher},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Toward Software Diversity in Heterogeneous Networked Systems},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {114--129},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_8},
  doi          = {10.1007/978-3-662-43936-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/HuangZE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/TaleleTEJ14,
  author       = {Nirupama Talele and
                  Jason Teutsch and
                  Robert F. Erbacher and
                  Trent Jaeger},
  editor       = {Sylvia L. Osborn and
                  Mahesh V. Tripunitara and
                  Ian M. Molloy},
  title        = {Monitor placement for large-scale systems},
  booktitle    = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '14, London, ON, Canada - June 25 - 27, 2014},
  pages        = {29--40},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2613087.2613107},
  doi          = {10.1145/2613087.2613107},
  timestamp    = {Wed, 02 Jun 2021 09:13:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/TaleleTEJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KottWE14,
  author       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Preview},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {1--5},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_1},
  doi          = {10.1007/978-3-319-11391-3\_1},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KottWE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/AlbaneseEJMPPSS14,
  author       = {Massimiliano Albanese and
                  Robert F. Erbacher and
                  Sushil Jajodia and
                  Cristian Molinaro and
                  Fabio Persia and
                  Antonio Picariello and
                  Giancarlo Sperl{\`{\i}} and
                  V. S. Subrahmanian},
  editor       = {Robinson E. Pino},
  title        = {Recognizing Unexplained Behavior in Network Traffic},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {39--62},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_3},
  doi          = {10.1007/978-1-4614-7597-2\_3},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/AlbaneseEJMPPSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/YenEZ014,
  author       = {John Yen and
                  Robert F. Erbacher and
                  Chen Zhong and
                  Peng Liu},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Cognitive Process},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {119--144},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_7},
  doi          = {10.1007/978-3-319-11391-3\_7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/YenEZ014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KottWE14a,
  author       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Concluding Thoughts},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {323--328},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_15},
  doi          = {10.1007/978-3-319-11391-3\_15},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KottWE14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/62,
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3},
  doi          = {10.1007/978-3-319-11391-3},
  isbn         = {978-3-319-11390-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/62.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ErbacherJTT14,
  author       = {Robert F. Erbacher and
                  Trent Jaeger and
                  Nirupama Talele and
                  Jason Teutsch},
  title        = {Directed Multicut with linearly ordered terminals},
  journal      = {CoRR},
  volume       = {abs/1407.7498},
  year         = {2014},
  url          = {http://arxiv.org/abs/1407.7498},
  eprinttype    = {arXiv},
  eprint       = {1407.7498},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ErbacherJTT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ChengYE13,
  author       = {Maggie X. Cheng and
                  Quanmin Ye and
                  Robert F. Erbacher},
  editor       = {Frederick T. Sheldon and
                  Annarita Giani and
                  Axel W. Krings and
                  Robert K. Abercrombie},
  title        = {Visualizing graph features for fast port scan detection},
  booktitle    = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
                  TN, USA, January 8-10, 2013},
  pages        = {30},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2459976.2460010},
  doi          = {10.1145/2459976.2460010},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ChengYE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ChengCE13,
  author       = {Maggie X. Cheng and
                  Mariesa L. Crow and
                  Robert F. Erbacher},
  editor       = {Frederick T. Sheldon and
                  Annarita Giani and
                  Axel W. Krings and
                  Robert K. Abercrombie},
  title        = {Vulnerability analysis of a smart grid with monitoring and control
                  system},
  booktitle    = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
                  TN, USA, January 8-10, 2013},
  pages        = {59},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2459976.2460042},
  doi          = {10.1145/2459976.2460042},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ChengCE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/TaleleTJE13,
  author       = {Nirupama Talele and
                  Jason Teutsch and
                  Trent Jaeger and
                  Robert F. Erbacher},
  editor       = {Jan J{\"{u}}rjens and
                  Benjamin Livshits and
                  Riccardo Scandariato},
  title        = {Using Security Policies to Automate Placement of Network Intrusion
                  Prevention},
  booktitle    = {Engineering Secure Software and Systems - 5th International Symposium,
                  ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7781},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36563-8\_2},
  doi          = {10.1007/978-3-642-36563-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/TaleleTJE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/VimercatiEFJLS13,
  author       = {Sabrina De Capitani di Vimercati and
                  Robert F. Erbacher and
                  Sara Foresti and
                  Sushil Jajodia and
                  Giovanni Livraga and
                  Pierangela Samarati},
  editor       = {Alessandro Aldini and
                  Javier L{\'{o}}pez and
                  Fabio Martinelli},
  title        = {Encryption and Fragmentation for Data Confidentiality in the Cloud},
  booktitle    = {Foundations of Security Analysis and Design {VII} - {FOSAD} 2012/2013
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {8604},
  pages        = {212--243},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-10082-1\_8},
  doi          = {10.1007/978-3-319-10082-1\_8},
  timestamp    = {Thu, 29 Aug 2019 08:10:01 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/VimercatiEFJLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ChengYE13,
  author       = {Maggie X. Cheng and
                  Quanmin Ye and
                  Robert F. Erbacher},
  title        = {Characterization and visualization of sophisticated scanning attacks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2013, Budapest, Hungary, June 9-13, 2013},
  pages        = {2047--2051},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICC.2013.6654827},
  doi          = {10.1109/ICC.2013.6654827},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ChengYE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isca/ErbacherS12,
  author       = {Robert F. Erbacher and
                  Rian Shelley},
  title        = {GULv3 - {A} Novel Tool for Network Managers to Audit Networks},
  journal      = {Int. J. Comput. Their Appl.},
  volume       = {19},
  number       = {1},
  pages        = {26--39},
  year         = {2012},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isca/ErbacherS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/ErbacherH12,
  author       = {Robert F. Erbacher and
                  Steve E. Hutchinson},
  title        = {Extending Case-Based Reasoning to Network Alert Reporting},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {187--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.31},
  doi          = {10.1109/CYBERSECURITY.2012.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/ErbacherH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/ShevenellE12,
  author       = {Michael J. Shevenell and
                  Robert F. Erbacher},
  editor       = {Shahram Latifi},
  title        = {Design and Implementation of an Open Network and Host-Based Intrusion
                  Detection Testbed with an Emphasis on Accuracy and Repeatability},
  booktitle    = {Ninth International Conference on Information Technology: New Generations,
                  {ITNG} 2012, Las Vegas, Nevada, USA, 16-18 April, 2012},
  pages        = {409--416},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ITNG.2012.99},
  doi          = {10.1109/ITNG.2012.99},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/ShevenellE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/ErbacherH12,
  author       = {Robert F. Erbacher and
                  Steve E. Hutchinson},
  editor       = {Shahram Latifi},
  title        = {Distributed Sensor Objects for Intrusion Detection Systems},
  booktitle    = {Ninth International Conference on Information Technology: New Generations,
                  {ITNG} 2012, Las Vegas, Nevada, USA, 16-18 April, 2012},
  pages        = {417--424},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ITNG.2012.100},
  doi          = {10.1109/ITNG.2012.100},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/ErbacherH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/Erbacher12,
  author       = {Robert F. Erbacher},
  editor       = {Dino Schweitzer and
                  Daniel Quist},
  title        = {Visualization design for immediate high-level situational assessment},
  booktitle    = {9th International Symposium on Visualization for Cyber Security, VizSec
                  '12, Seattle, WA, USA, October 15, 2012},
  pages        = {17--24},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2379690.2379693},
  doi          = {10.1145/2379690.2379693},
  timestamp    = {Wed, 24 Feb 2021 16:44:20 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/Erbacher12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ErbacherBC11,
  author       = {Robert F. Erbacher and
                  Anupama Biswas and
                  Trent Cameron},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A novel data reduction technique},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {35},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179336},
  doi          = {10.1145/2179298.2179336},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ErbacherBC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ErbacherHE11,
  author       = {Robert F. Erbacher and
                  Steve E. Hutchinson and
                  Joshua Edwards},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Web traffic profiling and characterization},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {71},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179380},
  doi          = {10.1145/2179298.2179380},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ErbacherHE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sadfe/Erbacher11,
  author       = {Robert F. Erbacher},
  editor       = {Robert F. Erbacher and
                  Roy H. Campbell and
                  Yong Guan},
  title        = {Preparing for the Next Wikileaks: Making Forensics Techniques Work},
  booktitle    = {2011 {IEEE} Sixth International Workshop on Systematic Approaches
                  to Digital Forensic Engineering, {SADFE} 2011, Oakland, CA, USA, May
                  26, 2011},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SADFE.2011.14},
  doi          = {10.1109/SADFE.2011.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sadfe/Erbacher11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vda/WhitakerE11,
  author       = {Robert B. Whitaker and
                  Robert F. Erbacher},
  editor       = {Pak Chung Wong and
                  Jinah Park and
                  Ming C. Hao and
                  Chaomei Chen and
                  Katy B{\"{o}}rner and
                  David L. Kao and
                  Jonathan C. Roberts},
  title        = {A tri-linear visualization for network anomaly detection},
  booktitle    = {Visualization and Data Analysis 2011, San Francisco Airport, CA, USA,
                  January 24-25, 2011},
  series       = {{SPIE} Proceedings},
  volume       = {7868},
  pages        = {78680P},
  publisher    = {{SPIE}},
  year         = {2011},
  url          = {https://doi.org/10.1117/12.872697},
  doi          = {10.1117/12.872697},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vda/WhitakerE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sadfe/2011,
  editor       = {Robert F. Erbacher and
                  Roy H. Campbell and
                  Yong Guan},
  title        = {2011 {IEEE} Sixth International Workshop on Systematic Approaches
                  to Digital Forensic Engineering, {SADFE} 2011, Oakland, CA, USA, May
                  26, 2011},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6157819/proceeding},
  isbn         = {978-1-4673-1242-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sadfe/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ivs/ErbacherFWMF10,
  author       = {Robert F. Erbacher and
                  Deborah A. Frincke and
                  Pak Chung Wong and
                  Sarah J. Moody and
                  Glenn A. Fink},
  title        = {A multi-phase network situational awareness cognitive task analysis},
  journal      = {Inf. Vis.},
  volume       = {9},
  number       = {3},
  pages        = {204--219},
  year         = {2010},
  url          = {https://doi.org/10.1057/ivs.2010.5},
  doi          = {10.1057/IVS.2010.5},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ivs/ErbacherFWMF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/ErbacherF10,
  author       = {Robert F. Erbacher and
                  Karen A. Forcht},
  title        = {Combining Visualization and Interaction for Scalable Detection of
                  Anomalies in Network Data},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {50},
  number       = {4},
  pages        = {117--126},
  year         = {2010},
  url          = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2010.11645437},
  doi          = {10.1080/08874417.2010.11645437},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/ErbacherF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/Erbacher10,
  author       = {Robert F. Erbacher},
  editor       = {Shahram Latifi},
  title        = {Validation for Digital Forensics},
  booktitle    = {Seventh International Conference on Information Technology: New Generations,
                  {ITNG} 2010, Las Vegas, Nevada, USA, 12-14 April 2010},
  pages        = {756--761},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ITNG.2010.18},
  doi          = {10.1109/ITNG.2010.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/Erbacher10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vda/ErbacherFWMF10,
  author       = {Robert F. Erbacher and
                  Deborah A. Frincke and
                  Pak Chung Wong and
                  Sarah J. Moody and
                  Glenn A. Fink},
  editor       = {Jinah Park and
                  Ming C. Hao and
                  Pak Chung Wong and
                  Chaomei Chen},
  title        = {Cognitive task analysis of network analysts and managers for network
                  situational awareness},
  booktitle    = {Visualization and Data Analysis, {VDA} 2010, San Jose, CA, USA, January
                  18-19, 2010},
  series       = {{SPIE} Proceedings},
  volume       = {7530},
  pages        = {75300},
  publisher    = {{SPIE}},
  year         = {2010},
  url          = {https://doi.org/10.1117/12.845488},
  doi          = {10.1117/12.845488},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vda/ErbacherFWMF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/Erbacher09,
  author       = {Robert F. Erbacher},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi},
  title        = {Visualization for Rapid Assessment and Projection in Cyber Situational
                  Awareness},
  booktitle    = {Proceedings of the 2009 International Conference on Security {\&}
                  Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {475--480},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Sat, 19 Dec 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/Erbacher09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sadfe/ErbacherDM09,
  author       = {Robert F. Erbacher and
                  Jason Daniels and
                  Steena Dominica Steven Monteiro},
  title        = {OleDetection},
  booktitle    = {Fourth International {IEEE} Workshop on Systematic Approaches to Digital
                  Forensic Engineering, {SADFE} 2009, Berkeley, California, USA, May
                  21, 2009},
  pages        = {85--96},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SADFE.2009.18},
  doi          = {10.1109/SADFE.2009.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sadfe/ErbacherDM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vizsec/2009,
  editor       = {Deborah A. Frincke and
                  Carrie Gates and
                  John R. Goodall and
                  Robert F. Erbacher},
  title        = {6th International Workshop on Visualization for Cyber Security, VizSec
                  2009, Atlantic City, NJ, USA, October 11, 2009},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5368324/proceeding},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/ErbacherCBM08,
  author       = {Robert F. Erbacher and
                  Adele Cutler and
                  Pranab Banerjee and
                  Jim Marshall},
  editor       = {Hamid R. Arabnia and
                  Selim Aissi},
  title        = {A Multi-Layered Approach to Botnet Detection},
  booktitle    = {Proceedings of the 2008 International Conference on Security {\&}
                  Management, {SAM} 2008, Las Vegas, Nevada, USA, July 14-17, 2008},
  pages        = {301--308},
  publisher    = {{CSREA} Press},
  year         = {2008},
  timestamp    = {Sat, 19 Dec 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/ErbacherCBM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/Erbacher08,
  author       = {Robert F. Erbacher},
  editor       = {Hamid R. Arabnia and
                  Selim Aissi},
  title        = {Steps for Improving Data Comprehension for Digital Security and Forensics},
  booktitle    = {Proceedings of the 2008 International Conference on Security {\&}
                  Management, {SAM} 2008, Las Vegas, Nevada, USA, July 14-17, 2008},
  pages        = {318--326},
  publisher    = {{CSREA} Press},
  year         = {2008},
  timestamp    = {Sat, 19 Dec 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/Erbacher08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sadfe/MoodyE08,
  author       = {Sarah J. Moody and
                  Robert F. Erbacher},
  title        = {S{\'{A}}DI - Statistical Analysis for Data Type Identification},
  booktitle    = {Third International Workshop on Systematic Approaches to Digital Forensic
                  Engineering, {SADFE} 2008, Berkeley, California, USA, May 22, 2008},
  pages        = {41--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SADFE.2008.13},
  doi          = {10.1109/SADFE.2008.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sadfe/MoodyE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sadfe/MonteiroE08,
  author       = {Steena Dominica Steven Monteiro and
                  Robert F. Erbacher},
  title        = {Exemplifying Attack Identification and Analysis in a Novel Forensically
                  Viable Syslog Model},
  booktitle    = {Third International Workshop on Systematic Approaches to Digital Forensic
                  Engineering, {SADFE} 2008, Berkeley, California, USA, May 22, 2008},
  pages        = {57--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SADFE.2008.14},
  doi          = {10.1109/SADFE.2008.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sadfe/MonteiroE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vda/Erbacher08,
  author       = {Robert F. Erbacher},
  editor       = {Katy B{\"{o}}rner and
                  Matti T. Gr{\"{o}}hn and
                  Jinah Park and
                  Jonathan C. Roberts},
  title        = {The forensic validity of visual analytics},
  booktitle    = {Visualization and Data Analysis 2008, San Jose, CA, USA, January 28-29,
                  2008},
  series       = {{SPIE} Proceedings},
  volume       = {6809},
  pages        = {68090H},
  publisher    = {{SPIE}},
  year         = {2008},
  url          = {https://doi.org/10.1117/12.786400},
  doi          = {10.1117/12.786400},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vda/Erbacher08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SwartE07,
  author       = {Richard S. Swart and
                  Robert F. Erbacher},
  title        = {Educating Students to Create Trustworthy Systems},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {5},
  number       = {3},
  pages        = {58--61},
  year         = {2007},
  url          = {https://doi.org/10.1109/MSP.2007.58},
  doi          = {10.1109/MSP.2007.58},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SwartE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iv/Erbacher07,
  author       = {Robert F. Erbacher},
  title        = {Exemplifying the Inter-Disciplinary Nature of Visualization Research},
  booktitle    = {11th International Conference on Information Visualisation, {IV} 2007,
                  2-6 July 2007, Z{\"{u}}rich, Switzerland},
  pages        = {623--630},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IV.2007.49},
  doi          = {10.1109/IV.2007.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iv/Erbacher07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sadfe/ErbacherM07,
  author       = {Robert F. Erbacher and
                  John Mulholland},
  editor       = {Ming{-}Yuh Huang and
                  Deborah A. Frincke},
  title        = {Identification and Localization of Data Types within Large-Scale File
                  Systems},
  booktitle    = {Second International Workshop on Systematic Approaches to Digital
                  Forensic Engineering, {SADFE} 2007, Seattle, Washington, USA, April
                  10-12, 2007},
  pages        = {55--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SADFE.2007.12},
  doi          = {10.1109/SADFE.2007.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sadfe/ErbacherM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sadfe/ErbacherEF07,
  author       = {Robert F. Erbacher and
                  Barbara Endicott{-}Popovsky and
                  Deborah A. Frincke},
  editor       = {Ming{-}Yuh Huang and
                  Deborah A. Frincke},
  title        = {Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution},
  booktitle    = {Second International Workshop on Systematic Approaches to Digital
                  Forensic Engineering, {SADFE} 2007, Seattle, Washington, USA, April
                  10-12, 2007},
  pages        = {150--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SADFE.2007.5},
  doi          = {10.1109/SADFE.2007.5},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sadfe/ErbacherEF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vda/2007,
  editor       = {Robert F. Erbacher and
                  Jonathan C. Roberts and
                  Matti T. Gr{\"{o}}hn and
                  Katy B{\"{o}}rner},
  title        = {Visualization and Data Analysis 2007, San Jose, CA, USA, January 29-30,
                  2007},
  series       = {{SPIE} Proceedings},
  volume       = {6495},
  publisher    = {{SPIE}},
  year         = {2007},
  url          = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=6495},
  isbn         = {978-0-8194-6608-2},
  timestamp    = {Fri, 15 Jul 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vda/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/TeelinkE06,
  author       = {Sheldon Teelink and
                  Robert F. Erbacher},
  title        = {Improving the computer forensic analysis process through visualization},
  journal      = {Commun. {ACM}},
  volume       = {49},
  number       = {2},
  pages        = {71--75},
  year         = {2006},
  url          = {https://doi.org/10.1145/1113034.1113073},
  doi          = {10.1145/1113034.1113073},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/TeelinkE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cga/ForestiALME06,
  author       = {Stefano Foresti and
                  James Agutter and
                  Yarden Livnat and
                  Shaun Moon and
                  Robert F. Erbacher},
  title        = {Visual Correlation of Network Alerts},
  journal      = {{IEEE} Computer Graphics and Applications},
  volume       = {26},
  number       = {2},
  pages        = {48--59},
  year         = {2006},
  url          = {https://doi.org/10.1109/MCG.2006.49},
  doi          = {10.1109/MCG.2006.49},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cga/ForestiALME06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vda/2006,
  editor       = {Robert F. Erbacher and
                  Jonathan C. Roberts and
                  Matti T. Gr{\"{o}}hn and
                  Katy B{\"{o}}rner},
  title        = {Visualization and Data Analysis 2006, San Jose, CA, USA, January 15,
                  2006},
  series       = {{SPIE} Proceedings},
  volume       = {6060},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=6060},
  isbn         = {978-0-8194-6100-1},
  timestamp    = {Sun, 17 Jul 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vda/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/ErbacherG05,
  author       = {Robert F. Erbacher and
                  Menashe Garber},
  editor       = {Hamid R. Arabnia},
  title        = {Real-Time Interactive Visual Port Monitoring and Analysis},
  booktitle    = {Proceedings of The 2005 International Conference on Security and Management,
                  {SAM} 2005, Las Vegas, Nevada, USA, June 20-23, 2005},
  pages        = {228--234},
  publisher    = {{CSREA} Press},
  year         = {2005},
  timestamp    = {Wed, 06 Dec 2006 10:55:26 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/ErbacherG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/Erbacher05,
  author       = {Robert F. Erbacher},
  title        = {Extending command and control infrastructures to cyber warfare assets},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  and Cybernetics, Waikoloa, Hawaii, USA, October 10-12, 2005},
  pages        = {3331--3337},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICSMC.2005.1571660},
  doi          = {10.1109/ICSMC.2005.1571660},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/Erbacher05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/ErbacherCS05,
  author       = {Robert F. Erbacher and
                  Kim Christensen and
                  Amanda Sundberg},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Designing Visualization Capabilities for {IDS} Challenges},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {15},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.5},
  doi          = {10.1109/VIZSEC.2005.5},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/ErbacherCS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vda/2005,
  editor       = {Robert F. Erbacher and
                  Jonathan C. Roberts and
                  Matti T. Gr{\"{o}}hn and
                  Katy B{\"{o}}rner},
  title        = {Visualization and Data Analysis 2005, San Jose, CA, USA, January 17,
                  2005},
  series       = {{SPIE} Proceedings},
  volume       = {5669},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=5669},
  isbn         = {978-0-8194-5642-7},
  timestamp    = {Mon, 18 Jul 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vda/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/Erbacher04,
  author       = {Robert F. Erbacher},
  editor       = {Hamid R. Arabnia and
                  Selim Aissi and
                  Youngsong Mun},
  title        = {Analysis and Management of Intrusion Data Collection},
  booktitle    = {Proceedings of the International Conference on Security and Management,
                  {SAM} '04, June 21-24, 2004, Las Vegas, Nevada, {USA}},
  pages        = {179--185},
  publisher    = {{CSREA} Press},
  year         = {2004},
  timestamp    = {Wed, 06 Dec 2006 10:55:26 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/Erbacher04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vda/2004,
  editor       = {Robert F. Erbacher and
                  Philip C. Chen and
                  Jonathan C. Roberts and
                  Matti T. Gr{\"{o}}hn and
                  Katy B{\"{o}}rner},
  title        = {Visualization and Data Analysis 2004, San Jose, CA, USA, January 18,
                  2004},
  series       = {{SPIE} Proceedings},
  volume       = {5295},
  publisher    = {{SPIE}},
  year         = {2004},
  url          = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=5295},
  isbn         = {978-0-8194-5198-9},
  timestamp    = {Tue, 19 Jul 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vda/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/YasinsacEMPS03,
  author       = {Alec Yasinsac and
                  Robert F. Erbacher and
                  Donald G. Marks and
                  Mark Pollitt and
                  Peter M. Sommer},
  title        = {Computer Forensics Education},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {1},
  number       = {4},
  pages        = {15--23},
  year         = {2003},
  url          = {https://doi.org/10.1109/MSECP.2003.1219052},
  doi          = {10.1109/MSECP.2003.1219052},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/YasinsacEMPS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/Erbacher03,
  author       = {Robert F. Erbacher},
  title        = {Intrusion behavior detection through visualization},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  {\&} Cybernetics: Washington, D.C., USA, 5-8 October 2003},
  pages        = {2507--2513},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICSMC.2003.1244260},
  doi          = {10.1109/ICSMC.2003.1244260},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/Erbacher03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vda/ErbacherT03,
  author       = {Robert F. Erbacher and
                  Zhouxuan Teng},
  editor       = {Robert F. Erbacher and
                  Philip C. Chen and
                  Jonathan C. Roberts and
                  Matti T. Gr{\"{o}}hn and
                  Katy B{\"{o}}rner},
  title        = {Analysis and application of node layout algorithms for intrusion detection},
  booktitle    = {Visualization and Data Analysis 2003, Santa Clara, CA, USA, January
                  20, 2003},
  series       = {{SPIE} Proceedings},
  volume       = {5009},
  pages        = {160--170},
  publisher    = {{SPIE}},
  year         = {2003},
  url          = {https://doi.org/10.1117/12.473927},
  doi          = {10.1117/12.473927},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vda/ErbacherT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vda/2003,
  editor       = {Robert F. Erbacher and
                  Philip C. Chen and
                  Jonathan C. Roberts and
                  Matti T. Gr{\"{o}}hn and
                  Katy B{\"{o}}rner},
  title        = {Visualization and Data Analysis 2003, Santa Clara, CA, USA, January
                  20, 2003},
  series       = {{SPIE} Proceedings},
  volume       = {5009},
  publisher    = {{SPIE}},
  year         = {2003},
  url          = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=5009},
  isbn         = {978-0-8194-4809-5},
  timestamp    = {Wed, 20 Jul 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vda/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cga/ErbacherWF02,
  author       = {Robert F. Erbacher and
                  Kenneth L. Walker and
                  Deborah A. Frincke},
  title        = {Intrusion and Misuse Detection in Large-Scale Systems},
  journal      = {{IEEE} Computer Graphics and Applications},
  volume       = {22},
  number       = {1},
  pages        = {38--48},
  year         = {2002},
  url          = {https://doi.org/10.1109/38.974517},
  doi          = {10.1109/38.974517},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cga/ErbacherWF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vda/Erbacher02,
  author       = {Robert F. Erbacher},
  editor       = {Robert F. Erbacher and
                  Philip C. Chen and
                  Matti Gr{\"{o}}hn and
                  Jonathan C. Roberts and
                  Craig M. Wittenbrink},
  title        = {Glyph-based generic network visualization},
  booktitle    = {Visualization and Data Analysis 2002, San Jose, CA, USA, January 19,
                  2002},
  series       = {{SPIE} Proceedings},
  volume       = {4665},
  pages        = {228--237},
  publisher    = {{SPIE}},
  year         = {2002},
  url          = {https://doi.org/10.1117/12.458790},
  doi          = {10.1117/12.458790},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vda/Erbacher02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vda/2002,
  editor       = {Robert F. Erbacher and
                  Philip C. Chen and
                  Matti Gr{\"{o}}hn and
                  Jonathan C. Roberts and
                  Craig M. Wittenbrink},
  title        = {Visualization and Data Analysis 2002, San Jose, CA, USA, January 19,
                  2002},
  series       = {{SPIE} Proceedings},
  volume       = {4665},
  publisher    = {{SPIE}},
  year         = {2002},
  url          = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=4665},
  isbn         = {978-0-8194-4405-9},
  timestamp    = {Thu, 21 Jul 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vda/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/viip/Erbacher01,
  author       = {Robert F. Erbacher},
  editor       = {M. H. Hamza},
  title        = {Visual Behavior Characterization for Intrusion Detection in Large
                  Scale Systems},
  booktitle    = {Proceedings of the {IASTED} International Conference on Visualization,
                  Imaging and Image Processing {(VIIP} 2001), Marbella, Spain, September
                  3-5, 2001},
  pages        = {54--59},
  publisher    = {{ACTA} Press},
  year         = {2001},
  timestamp    = {Mon, 17 Jan 2005 15:16:16 +0100},
  biburl       = {https://dblp.org/rec/conf/viip/Erbacher01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/ErbacherP00,
  author       = {Robert F. Erbacher and
                  Alex Pang},
  title        = {Guest Editorial: Special Section on Visualization and Data Analysis},
  journal      = {J. Electronic Imaging},
  volume       = {9},
  number       = {4},
  pages        = {354--355},
  year         = {2000},
  url          = {https://doi.org/10.1117/1.1290511},
  doi          = {10.1117/1.1290511},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jei/ErbacherP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iv/ErbacherF00,
  author       = {Robert F. Erbacher and
                  Deborah A. Frincke},
  title        = {Visualization in Detection of Intrusions and Misuse in Large Scale
                  Networks},
  booktitle    = {International Conference on Information Visualisation, {IV} 2000,
                  London, England, UK, July 19-21, 2000},
  pages        = {294--302},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/IV.2000.859771},
  doi          = {10.1109/IV.2000.859771},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iv/ErbacherF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cg/ErbacherGLLMPS95,
  author       = {Robert F. Erbacher and
                  Georges G. Grinstein and
                  John Peter Lee and
                  Haim Levkowitz and
                  Lisa Masterman and
                  Ronald M. Pickett and
                  Stuart Smith},
  title        = {Exploratory visualization research at the University of Massachusetts
                  at Lowell},
  journal      = {Comput. Graph.},
  volume       = {19},
  number       = {1},
  pages        = {131--139},
  year         = {1995},
  url          = {https://doi.org/10.1016/0097-8493(94)00128-L},
  doi          = {10.1016/0097-8493(94)00128-L},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cg/ErbacherGLLMPS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics