Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Holger Jaenisch
@inproceedings{DBLP:conf/asunam/NunesBSLBTJ15, author = {Eric Nunes and Casey Buto and Paulo Shakarian and Christian Lebiere and Stefano Bennati and Robert Thomson and Holger Jaenisch}, editor = {Jian Pei and Fabrizio Silvestri and Jie Tang}, title = {Malware Task Identification: {A} Data Driven Approach}, booktitle = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France, August 25 - 28, 2015}, pages = {978--985}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808797.2808894}, doi = {10.1145/2808797.2808894}, timestamp = {Thu, 11 Mar 2021 17:04:51 +0100}, biburl = {https://dblp.org/rec/conf/asunam/NunesBSLBTJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NunesBSLBTJ15, author = {Eric Nunes and Casey Buto and Paulo Shakarian and Christian Lebiere and Stefano Bennati and Robert Thomson and Holger Jaenisch}, title = {Malware Task Identification: {A} Data Driven Approach}, journal = {CoRR}, volume = {abs/1507.01930}, year = {2015}, url = {http://arxiv.org/abs/1507.01930}, eprinttype = {arXiv}, eprint = {1507.01930}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NunesBSLBTJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/JaenischHAWBCMA09, author = {Holger Jaenisch and James W. Handley and Nathaniel Albritton and David Whitener and Randel Burnett and Robert Caspers and Stephen Moren and Thomas Alexander and William Maddox III and William Albritton Jr.}, editor = {Belur V. Dasarathy}, title = {Autonomous journaling response using data model {LUTS}}, booktitle = {Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009, 13 April 2009, Orlando, Florida, {USA}}, series = {{SPIE} Proceedings}, volume = {7344}, pages = {734409}, publisher = {{SPIE}}, year = {2009}, url = {https://doi.org/10.1117/12.817863}, doi = {10.1117/12.817863}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/JaenischHAWBCMA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/JaenischHBEGFL06, author = {Holger Jaenisch and James W. Handley and Marvin H. Barnett and Richard Esslinger and David A. Grover and Jeffrey P. Faucheux and Kenneth Lamkin}, editor = {Belur V. Dasarathy}, title = {Data modeling for predictive behavior hypothesis formation and testing}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, Orlando (Kissimmee), FL, USA, April 17, 2006}, series = {{SPIE} Proceedings}, volume = {6241}, pages = {62410P}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.666411}, doi = {10.1117/12.666411}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/JaenischHBEGFL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dmkdttt/JaenischHFL05, author = {Holger Jaenisch and James W. Handley and Jeffrey P. Faucheux and Ken Lamkin}, editor = {Belur V. Dasarathy}, title = {Shai-Hulud: The quest for worm sign}, booktitle = {Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, Florida, USA, March 28-29, 2005}, series = {{SPIE} Proceedings}, volume = {5812}, pages = {321--329}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.603367}, doi = {10.1117/12.603367}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dmkdttt/JaenischHFL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spieVIP/JaenischH05, author = {Holger Jaenisch and James W. Handley}, editor = {Zia{-}ur Rahman and Robert A. Schowengerdt and Stephen E. Reichenbach}, title = {Data modeling augmentation of {JPEG} for real-time streaming video}, booktitle = {Visual Information Processing XIV, Orlando, Florida, USA, March 28, 2005}, series = {{SPIE} Proceedings}, volume = {5817}, pages = {258--269}, publisher = {{SPIE}}, year = {2005}, url = {https://doi.org/10.1117/12.603415}, doi = {10.1117/12.603415}, timestamp = {Fri, 06 May 2022 13:45:23 +0200}, biburl = {https://dblp.org/rec/conf/spieVIP/JaenischH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simulation/HandleyJBRC93, author = {James W. Handley and Holger Jaenisch and C. A. Bjork and L. T. Richardson and R. T. Carruth}, title = {Chaos and Fractal Algorithms Applied to Signal Processing and Analysis}, journal = {Simul.}, volume = {60}, number = {1}, pages = {36--53}, year = {1993}, url = {https://doi.org/10.1177/003754979306000104}, doi = {10.1177/003754979306000104}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/simulation/HandleyJBRC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simulation/HandleyJC93, author = {James W. Handley and Holger Jaenisch and R. T. Carruth}, title = {Chaos and Fractal Algorithms Applied to Signal Processing and Analysis}, journal = {Simul.}, volume = {60}, number = {4}, pages = {261--278}, year = {1993}, url = {https://doi.org/10.1177/003754979306000407}, doi = {10.1177/003754979306000407}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/simulation/HandleyJC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.