Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Robert F. Erbacher
@inproceedings{DBLP:conf/icmla/KhanAPRGWFBE23, author = {Md. Azim Khan and Nadeem Ahmed and Joyce Padela and Muhammad Shehrose Raza and Aryya Gangopadhyay and Jianwu Wang and James Foulds and Carl E. Busart and Robert F. Erbacher}, title = {Flood-ResNet50: Optimized Deep Learning Model for Efficient Flood Detection on Edge Device}, booktitle = {International Conference on Machine Learning and Applications, {ICMLA} 2023, Jacksonville, FL, USA, December 15-17, 2023}, pages = {512--519}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICMLA58977.2023.00077}, doi = {10.1109/ICMLA58977.2023.00077}, timestamp = {Tue, 02 Apr 2024 21:06:13 +0200}, biburl = {https://dblp.org/rec/conf/icmla/KhanAPRGWFBE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcomp/PutatundaKGWBE23, author = {Rohan Putatunda and Azim Khan and Aryya Gangopadhyay and Jianwu Wang and Carl E. Busart and Robert F. Erbacher}, title = {Vision Transformer-based Real-Time Camouflaged Object Detection System at Edge}, booktitle = {2023 {IEEE} International Conference on Smart Computing, {SMARTCOMP} 2023, Nashville, TN, USA, June 26-30, 2023}, pages = {90--97}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SMARTCOMP58114.2023.00029}, doi = {10.1109/SMARTCOMP58114.2023.00029}, timestamp = {Tue, 15 Aug 2023 09:17:51 +0200}, biburl = {https://dblp.org/rec/conf/smartcomp/PutatundaKGWBE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmla/OviGEB22, author = {Pretom Roy Ovi and Aryya Gangopadhyay and Robert F. Erbacher and Carl E. Busart}, editor = {M. Arif Wani and Mehmed M. Kantardzic and Vasile Palade and Daniel Neagu and Longzhi Yang and Kit Yan Chan}, title = {Secure Federated Training: Detecting Compromised Nodes and Identifying the Type of Attacks}, booktitle = {21st {IEEE} International Conference on Machine Learning and Applications, {ICMLA} 2022, Nassau, Bahamas, December 12-14, 2022}, pages = {1115--1120}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICMLA55696.2022.00183}, doi = {10.1109/ICMLA55696.2022.00183}, timestamp = {Wed, 29 Mar 2023 19:23:50 +0200}, biburl = {https://dblp.org/rec/conf/icmla/OviGEB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-08801, author = {Robert F. Erbacher}, title = {Base-Rate Fallacy Redux and a Deep Dive Review in Cybersecurity}, journal = {CoRR}, volume = {abs/2203.08801}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.08801}, doi = {10.48550/ARXIV.2203.08801}, eprinttype = {arXiv}, eprint = {2203.08801}, timestamp = {Mon, 28 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-08801.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-01703, author = {Sai Sree Laya Chukkapalli and Anupam Joshi and Tim Finin and Robert F. Erbacher}, title = {{CAPD:} {A} Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations}, journal = {CoRR}, volume = {abs/2208.01703}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.01703}, doi = {10.48550/ARXIV.2208.01703}, eprinttype = {arXiv}, eprint = {2208.01703}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-01703.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DauberESWFG21, author = {Edwin Dauber and Robert F. Erbacher and Gregory Shearer and Michael J. Weisman and Frederica Free{-}Nelson and Rachel Greenstadt}, title = {Supervised Authorship Segmentation of Open Source Code Projects}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {4}, pages = {464--479}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0080}, doi = {10.2478/POPETS-2021-0080}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/DauberESWFG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ZhongYLE19, author = {Chen Zhong and John Yen and Peng Liu and Robert F. Erbacher}, title = {Learning From Experts' Experience: Toward Automated Cyber Security Data Triage}, journal = {{IEEE} Syst. J.}, volume = {13}, number = {1}, pages = {603--614}, year = {2019}, url = {https://doi.org/10.1109/JSYST.2018.2828832}, doi = {10.1109/JSYST.2018.2828832}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/ZhongYLE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/0003HXZEJ019, author = {Ping Chen and Zhisheng Hu and Jun Xu and Minghui Zhu and Rob Erbacher and Sushil Jajodia and Peng Liu}, editor = {Sushil Jajodia and George Cybenko and Peng Liu and Cliff Wang and Michael P. Wellman}, title = {{MTD} Techniques for Memory Protection Against Zero-Day Attacks}, booktitle = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security}, series = {Lecture Notes in Computer Science}, volume = {11830}, pages = {129--155}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30719-6\_7}, doi = {10.1007/978-3-030-30719-6\_7}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/0003HXZEJ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/ZhongYLEGC17, author = {Chen Zhong and John Yen and Peng Liu and Robert F. Erbacher and Christopher Garneau and Bo Chen}, editor = {Peng Liu and Sushil Jajodia and Cliff Wang}, title = {Studying Analysts' Data Triage Operations in Cyber Defense Situational Analysis}, booktitle = {Theory and Models for Cyber Situation Awareness}, series = {Lecture Notes in Computer Science}, volume = {10030}, pages = {128--169}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61152-5\_6}, doi = {10.1007/978-3-319-61152-5\_6}, timestamp = {Mon, 03 Jan 2022 21:52:37 +0100}, biburl = {https://dblp.org/rec/series/lncs/ZhongYLEGC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenGXYECE16, author = {Zhijiang Chen and Linqiang Ge and Guobin Xu and Wei Yu and Robert F. Erbacher and Hasan Cam and Nnanna Ekedebe}, title = {A threat monitoring system in enterprise networks with smart mobiles}, journal = {Int. J. Secur. Networks}, volume = {11}, number = {1/2}, pages = {66--81}, year = {2016}, url = {https://doi.org/10.1504/IJSN.2016.075073}, doi = {10.1504/IJSN.2016.075073}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/ChenGXYECE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatasec/ZhongYLE16, author = {Chen Zhong and John Yen and Peng Liu and Robert F. Erbacher}, title = {Automate Cybersecurity Data Triage by Leveraging Human Analysts' Cognitive Process}, booktitle = {2nd {IEEE} International Conference on Big Data Security on Cloud, BigDataSecurity 2016, {IEEE} International Conference on High Performance and Smart Computing, {HPSC} 2016, and {IEEE} International Conference on Intelligent Data and Security, {IDS} 2016, New York, NY, USA, April 9-10, 2016}, pages = {357--363}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.41}, doi = {10.1109/BIGDATASECURITY-HPSC-IDS.2016.41}, timestamp = {Sun, 08 Aug 2021 01:40:50 +0200}, biburl = {https://dblp.org/rec/conf/bigdatasec/ZhongYLE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuGCECL16, author = {Jun Xu and Pinyao Guo and Bo Chen and Robert F. Erbacher and Ping Chen and Peng Liu}, editor = {Peng Liu and Cliff Wang}, title = {Demo: {A} Symbolic N-Variant System}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Moving Target Defense, MTD@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {65--68}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995272.2995284}, doi = {10.1145/2995272.2995284}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuGCECL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cogsima/ZhongYLEEG15, author = {Chen Zhong and John Yen and Peng Liu and Rob Erbacher and Renee Etoty and Christopher Garneau}, title = {{ARSCA:} a computer tool for tracing the cognitive processes of cyber-attack analysis}, booktitle = {{IEEE} International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, CogSIMA 2015, Orlando, FL, USA, March 9-12, 2015}, pages = {165--171}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/COGSIMA.2015.7108193}, doi = {10.1109/COGSIMA.2015.7108193}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cogsima/ZhongYLEEG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/ZhongY0EEG15, author = {Chen Zhong and John Yen and Peng Liu and Rob Erbacher and Renee Etoty and Christopher Garneau}, editor = {David M. Nicol}, title = {An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes}, booktitle = {Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015}, pages = {9:1--9:11}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2746194.2746203}, doi = {10.1145/2746194.2746203}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/ZhongY0EEG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ChengYCE15, author = {Maggie X. Cheng and Quanmin Ye and Xiaochun Cheng and Robert F. Erbacher}, title = {Network coding and coding-aware scheduling for multicast in wireless networks}, booktitle = {2015 {IEEE} International Conference on Communications, {ICC} 2015, London, United Kingdom, June 8-12, 2015}, pages = {5703--5708}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICC.2015.7249231}, doi = {10.1109/ICC.2015.7249231}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/ChengYCE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/BhattaraiWRYEC15, author = {Sulabh Bhattarai and Sixiao Wei and Stephen Rook and Wei Yu and Robert F. Erbacher and Hasan Cam}, title = {On simulation studies of jamming threats against {LTE} networks}, booktitle = {International Conference on Computing, Networking and Communications, {ICNC} 2015, Garden Grove, CA, USA, February 16-19, 2015}, pages = {99--103}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICCNC.2015.7069323}, doi = {10.1109/ICCNC.2015.7069323}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnc/BhattaraiWRYEC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stids/Ben-AsherOEG15, author = {Noam Ben{-}Asher and Alessandro Oltramari and Robert F. Erbacher and Cleotilde Gonzalez}, editor = {Kathryn Blackmond Laskey and Ian Emmons and Paulo C. G. Costa and Alessandro Oltramari}, title = {Ontology-based Adaptive Systems of Cyber Defense}, booktitle = {Proceedings of the Tenth Conference on Semantic Technology for Intelligence, Defense, and Security, Fairfax VA, USA, November 18-20, 2015}, series = {{CEUR} Workshop Proceedings}, volume = {1523}, pages = {34--41}, publisher = {CEUR-WS.org}, year = {2015}, url = {https://ceur-ws.org/Vol-1523/STIDS\_2015\_T05\_BenAsher\_etal.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:26 +0100}, biburl = {https://dblp.org/rec/conf/stids/Ben-AsherOEG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuGZEZL14, author = {Jun Xu and Pinyao Guo and Mingyi Zhao and Robert F. Erbacher and Minghui Zhu and Peng Liu}, editor = {Sushil Jajodia and Kun Sun}, title = {Comparing Different Moving Target Defense Techniques}, booktitle = {Proceedings of the First {ACM} Workshop on Moving Target Defense, {MTD} '14, Scottsdale, Arizona, USA, November 7, 2014}, pages = {97--107}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663474.2663486}, doi = {10.1145/2663474.2663486}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuGZEZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cogsima/ZhongSYLEHECG14, author = {Chen Zhong and Deepak Samuel and John Yen and Peng Liu and Robert F. Erbacher and Steve E. Hutchinson and Renee Etoty and Hasan Cam and William Glodek}, editor = {Gabriel Jakobson and Kristin E. Schaefer and Mitch Kokar and Ann M. Bisantz and Tom Ziemke}, title = {RankAOH: Context-driven similarity-based retrieval of experiences in cyber analysis}, booktitle = {{IEEE} International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, CogSIMA 2014, San Antonio, TX, USA, March 3-6, 2014}, pages = {230--236}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CogSIMA.2014.6816567}, doi = {10.1109/COGSIMA.2014.6816567}, timestamp = {Sun, 13 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cogsima/ZhongSYLEHECG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/HuangZE14, author = {Chu Huang and Sencun Zhu and Robert F. Erbacher}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Toward Software Diversity in Heterogeneous Networked Systems}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {114--129}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_8}, doi = {10.1007/978-3-662-43936-4\_8}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/HuangZE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/TaleleTEJ14, author = {Nirupama Talele and Jason Teutsch and Robert F. Erbacher and Trent Jaeger}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Monitor placement for large-scale systems}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {29--40}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613107}, doi = {10.1145/2613087.2613107}, timestamp = {Wed, 02 Jun 2021 09:13:31 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/TaleleTEJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KottWE14, author = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Preview}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {1--5}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_1}, doi = {10.1007/978-3-319-11391-3\_1}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/KottWE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/AlbaneseEJMPPSS14, author = {Massimiliano Albanese and Robert F. Erbacher and Sushil Jajodia and Cristian Molinaro and Fabio Persia and Antonio Picariello and Giancarlo Sperl{\`{\i}} and V. S. Subrahmanian}, editor = {Robinson E. Pino}, title = {Recognizing Unexplained Behavior in Network Traffic}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {39--62}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_3}, doi = {10.1007/978-1-4614-7597-2\_3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/AlbaneseEJMPPSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/YenEZ014, author = {John Yen and Robert F. Erbacher and Chen Zhong and Peng Liu}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Cognitive Process}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {119--144}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_7}, doi = {10.1007/978-3-319-11391-3\_7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/YenEZ014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KottWE14a, author = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Concluding Thoughts}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {323--328}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_15}, doi = {10.1007/978-3-319-11391-3\_15}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KottWE14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/62, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3}, doi = {10.1007/978-3-319-11391-3}, isbn = {978-3-319-11390-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/62.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ErbacherJTT14, author = {Robert F. Erbacher and Trent Jaeger and Nirupama Talele and Jason Teutsch}, title = {Directed Multicut with linearly ordered terminals}, journal = {CoRR}, volume = {abs/1407.7498}, year = {2014}, url = {http://arxiv.org/abs/1407.7498}, eprinttype = {arXiv}, eprint = {1407.7498}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ErbacherJTT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ChengYE13, author = {Maggie X. Cheng and Quanmin Ye and Robert F. Erbacher}, editor = {Frederick T. Sheldon and Annarita Giani and Axel W. Krings and Robert K. Abercrombie}, title = {Visualizing graph features for fast port scan detection}, booktitle = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge, TN, USA, January 8-10, 2013}, pages = {30}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2459976.2460010}, doi = {10.1145/2459976.2460010}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ChengYE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ChengCE13, author = {Maggie X. Cheng and Mariesa L. Crow and Robert F. Erbacher}, editor = {Frederick T. Sheldon and Annarita Giani and Axel W. Krings and Robert K. Abercrombie}, title = {Vulnerability analysis of a smart grid with monitoring and control system}, booktitle = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge, TN, USA, January 8-10, 2013}, pages = {59}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2459976.2460042}, doi = {10.1145/2459976.2460042}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ChengCE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/TaleleTJE13, author = {Nirupama Talele and Jason Teutsch and Trent Jaeger and Robert F. Erbacher}, editor = {Jan J{\"{u}}rjens and Benjamin Livshits and Riccardo Scandariato}, title = {Using Security Policies to Automate Placement of Network Intrusion Prevention}, booktitle = {Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7781}, pages = {17--32}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36563-8\_2}, doi = {10.1007/978-3-642-36563-8\_2}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/TaleleTJE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/VimercatiEFJLS13, author = {Sabrina De Capitani di Vimercati and Robert F. Erbacher and Sara Foresti and Sushil Jajodia and Giovanni Livraga and Pierangela Samarati}, editor = {Alessandro Aldini and Javier L{\'{o}}pez and Fabio Martinelli}, title = {Encryption and Fragmentation for Data Confidentiality in the Cloud}, booktitle = {Foundations of Security Analysis and Design {VII} - {FOSAD} 2012/2013 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {8604}, pages = {212--243}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-10082-1\_8}, doi = {10.1007/978-3-319-10082-1\_8}, timestamp = {Thu, 29 Aug 2019 08:10:01 +0200}, biburl = {https://dblp.org/rec/conf/fosad/VimercatiEFJLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ChengYE13, author = {Maggie X. Cheng and Quanmin Ye and Robert F. Erbacher}, title = {Characterization and visualization of sophisticated scanning attacks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2013, Budapest, Hungary, June 9-13, 2013}, pages = {2047--2051}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICC.2013.6654827}, doi = {10.1109/ICC.2013.6654827}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/ChengYE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isca/ErbacherS12, author = {Robert F. Erbacher and Rian Shelley}, title = {GULv3 - {A} Novel Tool for Network Managers to Audit Networks}, journal = {Int. J. Comput. Their Appl.}, volume = {19}, number = {1}, pages = {26--39}, year = {2012}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isca/ErbacherS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/ErbacherH12, author = {Robert F. Erbacher and Steve E. Hutchinson}, title = {Extending Case-Based Reasoning to Network Alert Reporting}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {187--194}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.31}, doi = {10.1109/CYBERSECURITY.2012.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/ErbacherH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/ShevenellE12, author = {Michael J. Shevenell and Robert F. Erbacher}, editor = {Shahram Latifi}, title = {Design and Implementation of an Open Network and Host-Based Intrusion Detection Testbed with an Emphasis on Accuracy and Repeatability}, booktitle = {Ninth International Conference on Information Technology: New Generations, {ITNG} 2012, Las Vegas, Nevada, USA, 16-18 April, 2012}, pages = {409--416}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ITNG.2012.99}, doi = {10.1109/ITNG.2012.99}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/ShevenellE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/ErbacherH12, author = {Robert F. Erbacher and Steve E. Hutchinson}, editor = {Shahram Latifi}, title = {Distributed Sensor Objects for Intrusion Detection Systems}, booktitle = {Ninth International Conference on Information Technology: New Generations, {ITNG} 2012, Las Vegas, Nevada, USA, 16-18 April, 2012}, pages = {417--424}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ITNG.2012.100}, doi = {10.1109/ITNG.2012.100}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/ErbacherH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/Erbacher12, author = {Robert F. Erbacher}, editor = {Dino Schweitzer and Daniel Quist}, title = {Visualization design for immediate high-level situational assessment}, booktitle = {9th International Symposium on Visualization for Cyber Security, VizSec '12, Seattle, WA, USA, October 15, 2012}, pages = {17--24}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2379690.2379693}, doi = {10.1145/2379690.2379693}, timestamp = {Wed, 24 Feb 2021 16:44:20 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/Erbacher12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ErbacherBC11, author = {Robert F. Erbacher and Anupama Biswas and Trent Cameron}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {A novel data reduction technique}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {35}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179336}, doi = {10.1145/2179298.2179336}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ErbacherBC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ErbacherHE11, author = {Robert F. Erbacher and Steve E. Hutchinson and Joshua Edwards}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Web traffic profiling and characterization}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {71}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179380}, doi = {10.1145/2179298.2179380}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ErbacherHE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sadfe/Erbacher11, author = {Robert F. Erbacher}, editor = {Robert F. Erbacher and Roy H. Campbell and Yong Guan}, title = {Preparing for the Next Wikileaks: Making Forensics Techniques Work}, booktitle = {2011 {IEEE} Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, {SADFE} 2011, Oakland, CA, USA, May 26, 2011}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SADFE.2011.14}, doi = {10.1109/SADFE.2011.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sadfe/Erbacher11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vda/WhitakerE11, author = {Robert B. Whitaker and Robert F. Erbacher}, editor = {Pak Chung Wong and Jinah Park and Ming C. Hao and Chaomei Chen and Katy B{\"{o}}rner and David L. Kao and Jonathan C. Roberts}, title = {A tri-linear visualization for network anomaly detection}, booktitle = {Visualization and Data Analysis 2011, San Francisco Airport, CA, USA, January 24-25, 2011}, series = {{SPIE} Proceedings}, volume = {7868}, pages = {78680P}, publisher = {{SPIE}}, year = {2011}, url = {https://doi.org/10.1117/12.872697}, doi = {10.1117/12.872697}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vda/WhitakerE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sadfe/2011, editor = {Robert F. Erbacher and Roy H. Campbell and Yong Guan}, title = {2011 {IEEE} Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, {SADFE} 2011, Oakland, CA, USA, May 26, 2011}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/6157819/proceeding}, isbn = {978-1-4673-1242-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sadfe/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ivs/ErbacherFWMF10, author = {Robert F. Erbacher and Deborah A. Frincke and Pak Chung Wong and Sarah J. Moody and Glenn A. Fink}, title = {A multi-phase network situational awareness cognitive task analysis}, journal = {Inf. Vis.}, volume = {9}, number = {3}, pages = {204--219}, year = {2010}, url = {https://doi.org/10.1057/ivs.2010.5}, doi = {10.1057/IVS.2010.5}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ivs/ErbacherFWMF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ErbacherF10, author = {Robert F. Erbacher and Karen A. Forcht}, title = {Combining Visualization and Interaction for Scalable Detection of Anomalies in Network Data}, journal = {J. Comput. Inf. Syst.}, volume = {50}, number = {4}, pages = {117--126}, year = {2010}, url = {https://www.tandfonline.com/doi/abs/10.1080/08874417.2010.11645437}, doi = {10.1080/08874417.2010.11645437}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/ErbacherF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/Erbacher10, author = {Robert F. Erbacher}, editor = {Shahram Latifi}, title = {Validation for Digital Forensics}, booktitle = {Seventh International Conference on Information Technology: New Generations, {ITNG} 2010, Las Vegas, Nevada, USA, 12-14 April 2010}, pages = {756--761}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ITNG.2010.18}, doi = {10.1109/ITNG.2010.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/Erbacher10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vda/ErbacherFWMF10, author = {Robert F. Erbacher and Deborah A. Frincke and Pak Chung Wong and Sarah J. Moody and Glenn A. Fink}, editor = {Jinah Park and Ming C. Hao and Pak Chung Wong and Chaomei Chen}, title = {Cognitive task analysis of network analysts and managers for network situational awareness}, booktitle = {Visualization and Data Analysis, {VDA} 2010, San Jose, CA, USA, January 18-19, 2010}, series = {{SPIE} Proceedings}, volume = {7530}, pages = {75300}, publisher = {{SPIE}}, year = {2010}, url = {https://doi.org/10.1117/12.845488}, doi = {10.1117/12.845488}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vda/ErbacherFWMF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/Erbacher09, author = {Robert F. Erbacher}, editor = {Hamid R. Arabnia and Kevin Daimi}, title = {Visualization for Rapid Assessment and Projection in Cyber Situational Awareness}, booktitle = {Proceedings of the 2009 International Conference on Security {\&} Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {475--480}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Sat, 19 Dec 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/Erbacher09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sadfe/ErbacherDM09, author = {Robert F. Erbacher and Jason Daniels and Steena Dominica Steven Monteiro}, title = {OleDetection}, booktitle = {Fourth International {IEEE} Workshop on Systematic Approaches to Digital Forensic Engineering, {SADFE} 2009, Berkeley, California, USA, May 21, 2009}, pages = {85--96}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SADFE.2009.18}, doi = {10.1109/SADFE.2009.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sadfe/ErbacherDM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vizsec/2009, editor = {Deborah A. Frincke and Carrie Gates and John R. Goodall and Robert F. Erbacher}, title = {6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5368324/proceeding}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/ErbacherCBM08, author = {Robert F. Erbacher and Adele Cutler and Pranab Banerjee and Jim Marshall}, editor = {Hamid R. Arabnia and Selim Aissi}, title = {A Multi-Layered Approach to Botnet Detection}, booktitle = {Proceedings of the 2008 International Conference on Security {\&} Management, {SAM} 2008, Las Vegas, Nevada, USA, July 14-17, 2008}, pages = {301--308}, publisher = {{CSREA} Press}, year = {2008}, timestamp = {Sat, 19 Dec 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/ErbacherCBM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/Erbacher08, author = {Robert F. Erbacher}, editor = {Hamid R. Arabnia and Selim Aissi}, title = {Steps for Improving Data Comprehension for Digital Security and Forensics}, booktitle = {Proceedings of the 2008 International Conference on Security {\&} Management, {SAM} 2008, Las Vegas, Nevada, USA, July 14-17, 2008}, pages = {318--326}, publisher = {{CSREA} Press}, year = {2008}, timestamp = {Sat, 19 Dec 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/Erbacher08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sadfe/MoodyE08, author = {Sarah J. Moody and Robert F. Erbacher}, title = {S{\'{A}}DI - Statistical Analysis for Data Type Identification}, booktitle = {Third International Workshop on Systematic Approaches to Digital Forensic Engineering, {SADFE} 2008, Berkeley, California, USA, May 22, 2008}, pages = {41--54}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SADFE.2008.13}, doi = {10.1109/SADFE.2008.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sadfe/MoodyE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sadfe/MonteiroE08, author = {Steena Dominica Steven Monteiro and Robert F. Erbacher}, title = {Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model}, booktitle = {Third International Workshop on Systematic Approaches to Digital Forensic Engineering, {SADFE} 2008, Berkeley, California, USA, May 22, 2008}, pages = {57--68}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SADFE.2008.14}, doi = {10.1109/SADFE.2008.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sadfe/MonteiroE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vda/Erbacher08, author = {Robert F. Erbacher}, editor = {Katy B{\"{o}}rner and Matti T. Gr{\"{o}}hn and Jinah Park and Jonathan C. Roberts}, title = {The forensic validity of visual analytics}, booktitle = {Visualization and Data Analysis 2008, San Jose, CA, USA, January 28-29, 2008}, series = {{SPIE} Proceedings}, volume = {6809}, pages = {68090H}, publisher = {{SPIE}}, year = {2008}, url = {https://doi.org/10.1117/12.786400}, doi = {10.1117/12.786400}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vda/Erbacher08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SwartE07, author = {Richard S. Swart and Robert F. Erbacher}, title = {Educating Students to Create Trustworthy Systems}, journal = {{IEEE} Secur. Priv.}, volume = {5}, number = {3}, pages = {58--61}, year = {2007}, url = {https://doi.org/10.1109/MSP.2007.58}, doi = {10.1109/MSP.2007.58}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SwartE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iv/Erbacher07, author = {Robert F. Erbacher}, title = {Exemplifying the Inter-Disciplinary Nature of Visualization Research}, booktitle = {11th International Conference on Information Visualisation, {IV} 2007, 2-6 July 2007, Z{\"{u}}rich, Switzerland}, pages = {623--630}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IV.2007.49}, doi = {10.1109/IV.2007.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iv/Erbacher07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sadfe/ErbacherM07, author = {Robert F. Erbacher and John Mulholland}, editor = {Ming{-}Yuh Huang and Deborah A. Frincke}, title = {Identification and Localization of Data Types within Large-Scale File Systems}, booktitle = {Second International Workshop on Systematic Approaches to Digital Forensic Engineering, {SADFE} 2007, Seattle, Washington, USA, April 10-12, 2007}, pages = {55--70}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SADFE.2007.12}, doi = {10.1109/SADFE.2007.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sadfe/ErbacherM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sadfe/ErbacherEF07, author = {Robert F. Erbacher and Barbara Endicott{-}Popovsky and Deborah A. Frincke}, editor = {Ming{-}Yuh Huang and Deborah A. Frincke}, title = {Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution}, booktitle = {Second International Workshop on Systematic Approaches to Digital Forensic Engineering, {SADFE} 2007, Seattle, Washington, USA, April 10-12, 2007}, pages = {150--154}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SADFE.2007.5}, doi = {10.1109/SADFE.2007.5}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sadfe/ErbacherEF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vda/2007, editor = {Robert F. Erbacher and Jonathan C. Roberts and Matti T. Gr{\"{o}}hn and Katy B{\"{o}}rner}, title = {Visualization and Data Analysis 2007, San Jose, CA, USA, January 29-30, 2007}, series = {{SPIE} Proceedings}, volume = {6495}, publisher = {{SPIE}}, year = {2007}, url = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=6495}, isbn = {978-0-8194-6608-2}, timestamp = {Fri, 15 Jul 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vda/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/TeelinkE06, author = {Sheldon Teelink and Robert F. Erbacher}, title = {Improving the computer forensic analysis process through visualization}, journal = {Commun. {ACM}}, volume = {49}, number = {2}, pages = {71--75}, year = {2006}, url = {https://doi.org/10.1145/1113034.1113073}, doi = {10.1145/1113034.1113073}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/TeelinkE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cga/ForestiALME06, author = {Stefano Foresti and James Agutter and Yarden Livnat and Shaun Moon and Robert F. Erbacher}, title = {Visual Correlation of Network Alerts}, journal = {{IEEE} Computer Graphics and Applications}, volume = {26}, number = {2}, pages = {48--59}, year = {2006}, url = {https://doi.org/10.1109/MCG.2006.49}, doi = {10.1109/MCG.2006.49}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cga/ForestiALME06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vda/2006, editor = {Robert F. Erbacher and Jonathan C. Roberts and Matti T. Gr{\"{o}}hn and Katy B{\"{o}}rner}, title = {Visualization and Data Analysis 2006, San Jose, CA, USA, January 15, 2006}, series = {{SPIE} Proceedings}, volume = {6060}, publisher = {{SPIE}}, year = {2006}, url = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=6060}, isbn = {978-0-8194-6100-1}, timestamp = {Sun, 17 Jul 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vda/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/ErbacherG05, author = {Robert F. Erbacher and Menashe Garber}, editor = {Hamid R. Arabnia}, title = {Real-Time Interactive Visual Port Monitoring and Analysis}, booktitle = {Proceedings of The 2005 International Conference on Security and Management, {SAM} 2005, Las Vegas, Nevada, USA, June 20-23, 2005}, pages = {228--234}, publisher = {{CSREA} Press}, year = {2005}, timestamp = {Wed, 06 Dec 2006 10:55:26 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/ErbacherG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/Erbacher05, author = {Robert F. Erbacher}, title = {Extending command and control infrastructures to cyber warfare assets}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man and Cybernetics, Waikoloa, Hawaii, USA, October 10-12, 2005}, pages = {3331--3337}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ICSMC.2005.1571660}, doi = {10.1109/ICSMC.2005.1571660}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/smc/Erbacher05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/ErbacherCS05, author = {Robert F. Erbacher and Kim Christensen and Amanda Sundberg}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Designing Visualization Capabilities for {IDS} Challenges}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {15}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.5}, doi = {10.1109/VIZSEC.2005.5}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/ErbacherCS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vda/2005, editor = {Robert F. Erbacher and Jonathan C. Roberts and Matti T. Gr{\"{o}}hn and Katy B{\"{o}}rner}, title = {Visualization and Data Analysis 2005, San Jose, CA, USA, January 17, 2005}, series = {{SPIE} Proceedings}, volume = {5669}, publisher = {{SPIE}}, year = {2005}, url = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=5669}, isbn = {978-0-8194-5642-7}, timestamp = {Mon, 18 Jul 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vda/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/Erbacher04, author = {Robert F. Erbacher}, editor = {Hamid R. Arabnia and Selim Aissi and Youngsong Mun}, title = {Analysis and Management of Intrusion Data Collection}, booktitle = {Proceedings of the International Conference on Security and Management, {SAM} '04, June 21-24, 2004, Las Vegas, Nevada, {USA}}, pages = {179--185}, publisher = {{CSREA} Press}, year = {2004}, timestamp = {Wed, 06 Dec 2006 10:55:26 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/Erbacher04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vda/2004, editor = {Robert F. Erbacher and Philip C. Chen and Jonathan C. Roberts and Matti T. Gr{\"{o}}hn and Katy B{\"{o}}rner}, title = {Visualization and Data Analysis 2004, San Jose, CA, USA, January 18, 2004}, series = {{SPIE} Proceedings}, volume = {5295}, publisher = {{SPIE}}, year = {2004}, url = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=5295}, isbn = {978-0-8194-5198-9}, timestamp = {Tue, 19 Jul 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vda/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/YasinsacEMPS03, author = {Alec Yasinsac and Robert F. Erbacher and Donald G. Marks and Mark Pollitt and Peter M. Sommer}, title = {Computer Forensics Education}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {15--23}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219052}, doi = {10.1109/MSECP.2003.1219052}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/YasinsacEMPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/Erbacher03, author = {Robert F. Erbacher}, title = {Intrusion behavior detection through visualization}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man {\&} Cybernetics: Washington, D.C., USA, 5-8 October 2003}, pages = {2507--2513}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ICSMC.2003.1244260}, doi = {10.1109/ICSMC.2003.1244260}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/smc/Erbacher03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vda/ErbacherT03, author = {Robert F. Erbacher and Zhouxuan Teng}, editor = {Robert F. Erbacher and Philip C. Chen and Jonathan C. Roberts and Matti T. Gr{\"{o}}hn and Katy B{\"{o}}rner}, title = {Analysis and application of node layout algorithms for intrusion detection}, booktitle = {Visualization and Data Analysis 2003, Santa Clara, CA, USA, January 20, 2003}, series = {{SPIE} Proceedings}, volume = {5009}, pages = {160--170}, publisher = {{SPIE}}, year = {2003}, url = {https://doi.org/10.1117/12.473927}, doi = {10.1117/12.473927}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vda/ErbacherT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vda/2003, editor = {Robert F. Erbacher and Philip C. Chen and Jonathan C. Roberts and Matti T. Gr{\"{o}}hn and Katy B{\"{o}}rner}, title = {Visualization and Data Analysis 2003, Santa Clara, CA, USA, January 20, 2003}, series = {{SPIE} Proceedings}, volume = {5009}, publisher = {{SPIE}}, year = {2003}, url = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=5009}, isbn = {978-0-8194-4809-5}, timestamp = {Wed, 20 Jul 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vda/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cga/ErbacherWF02, author = {Robert F. Erbacher and Kenneth L. Walker and Deborah A. Frincke}, title = {Intrusion and Misuse Detection in Large-Scale Systems}, journal = {{IEEE} Computer Graphics and Applications}, volume = {22}, number = {1}, pages = {38--48}, year = {2002}, url = {https://doi.org/10.1109/38.974517}, doi = {10.1109/38.974517}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cga/ErbacherWF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vda/Erbacher02, author = {Robert F. Erbacher}, editor = {Robert F. Erbacher and Philip C. Chen and Matti Gr{\"{o}}hn and Jonathan C. Roberts and Craig M. Wittenbrink}, title = {Glyph-based generic network visualization}, booktitle = {Visualization and Data Analysis 2002, San Jose, CA, USA, January 19, 2002}, series = {{SPIE} Proceedings}, volume = {4665}, pages = {228--237}, publisher = {{SPIE}}, year = {2002}, url = {https://doi.org/10.1117/12.458790}, doi = {10.1117/12.458790}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vda/Erbacher02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/vda/2002, editor = {Robert F. Erbacher and Philip C. Chen and Matti Gr{\"{o}}hn and Jonathan C. Roberts and Craig M. Wittenbrink}, title = {Visualization and Data Analysis 2002, San Jose, CA, USA, January 19, 2002}, series = {{SPIE} Proceedings}, volume = {4665}, publisher = {{SPIE}}, year = {2002}, url = {http://proceedings.spiedigitallibrary.org/volume.aspx?volume=4665}, isbn = {978-0-8194-4405-9}, timestamp = {Thu, 21 Jul 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vda/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/viip/Erbacher01, author = {Robert F. Erbacher}, editor = {M. H. Hamza}, title = {Visual Behavior Characterization for Intrusion Detection in Large Scale Systems}, booktitle = {Proceedings of the {IASTED} International Conference on Visualization, Imaging and Image Processing {(VIIP} 2001), Marbella, Spain, September 3-5, 2001}, pages = {54--59}, publisher = {{ACTA} Press}, year = {2001}, timestamp = {Mon, 17 Jan 2005 15:16:16 +0100}, biburl = {https://dblp.org/rec/conf/viip/Erbacher01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jei/ErbacherP00, author = {Robert F. Erbacher and Alex Pang}, title = {Guest Editorial: Special Section on Visualization and Data Analysis}, journal = {J. Electronic Imaging}, volume = {9}, number = {4}, pages = {354--355}, year = {2000}, url = {https://doi.org/10.1117/1.1290511}, doi = {10.1117/1.1290511}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jei/ErbacherP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iv/ErbacherF00, author = {Robert F. Erbacher and Deborah A. Frincke}, title = {Visualization in Detection of Intrusions and Misuse in Large Scale Networks}, booktitle = {International Conference on Information Visualisation, {IV} 2000, London, England, UK, July 19-21, 2000}, pages = {294--302}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/IV.2000.859771}, doi = {10.1109/IV.2000.859771}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iv/ErbacherF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cg/ErbacherGLLMPS95, author = {Robert F. Erbacher and Georges G. Grinstein and John Peter Lee and Haim Levkowitz and Lisa Masterman and Ronald M. Pickett and Stuart Smith}, title = {Exploratory visualization research at the University of Massachusetts at Lowell}, journal = {Comput. Graph.}, volume = {19}, number = {1}, pages = {131--139}, year = {1995}, url = {https://doi.org/10.1016/0097-8493(94)00128-L}, doi = {10.1016/0097-8493(94)00128-L}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cg/ErbacherGLLMPS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.