Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Charis Ermopoulos
@inproceedings{DBLP:conf/cluster/ErmopoulosY06, author = {Charis Ermopoulos and William Yurcik}, title = {NVision-PA: {A} Process Accounting Analysis Tool with a Security Focus on Masquerade Detection in {HPC} Clusters}, booktitle = {Proceedings of the 2006 {IEEE} International Conference on Cluster Computing, September 25-28, 2006, Barcelona, Spain}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CLUSTR.2006.311856}, doi = {10.1109/CLUSTR.2006.311856}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cluster/ErmopoulosY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0601079, author = {Katherine Luo and Yifan Li and Charis Ermopoulos and William Yurcik and Adam J. Slagell}, title = {{SCRUB-PA:} {A} Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting}, journal = {CoRR}, volume = {abs/cs/0601079}, year = {2006}, url = {http://arxiv.org/abs/cs/0601079}, eprinttype = {arXiv}, eprint = {cs/0601079}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0601079.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0606089, author = {Charis Ermopoulos and William Yurcik}, title = {NVision-PA: {A} Tool for Visual Analysis of Command Behavior Based on Process Accounting Logs (with a Case Study in {HPC} Cluster Security)}, journal = {CoRR}, volume = {abs/cs/0606089}, year = {2006}, url = {http://arxiv.org/abs/cs/0606089}, eprinttype = {arXiv}, eprint = {cs/0606089}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0606089.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/ArgyrosE03, author = {Tassos Argyros and Charis Ermopoulos}, title = {Efficient Subsequence Matching in Time Series Databases Under Time and Amplitude Transformations}, booktitle = {Proceedings of the 3rd {IEEE} International Conference on Data Mining {(ICDM} 2003), 19-22 December 2003, Melbourne, Florida, {USA}}, pages = {481--484}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ICDM.2003.1250957}, doi = {10.1109/ICDM.2003.1250957}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/ArgyrosE03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdm/ArgyrosEPA03, author = {Tassos Argyros and Charis Ermopoulos and Vassiliki Pavlaki and Nidal Al{-}Said}, editor = {Daniel Barbar{\'{a}} and Chandrika Kamath}, title = {Extracting Cyber Communities through Patterns}, booktitle = {Proceedings of the Third {SIAM} International Conference on Data Mining, San Francisco, CA, USA, May 1-3, 2003}, pages = {259--263}, publisher = {{SIAM}}, year = {2003}, url = {https://doi.org/10.1137/1.9781611972733.26}, doi = {10.1137/1.9781611972733.26}, timestamp = {Fri, 06 Oct 2023 11:45:43 +0200}, biburl = {https://dblp.org/rec/conf/sdm/ArgyrosEPA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.