Author of the publication

Case Study: Visualization and Information Retrieval Techniques for Network Intrusion Detection.

, , , , , and . VisSym, page 283-290. Eurographics Association, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VANET applications: Past, present, and future., and . Veh. Commun., (2021)Applying static analysis to high-dimensional malicious application detection., , , and . ACM Southeast Regional Conference, page 31:1-31:5. ACM, (2013)A dimensional transformation scheme for power grid cyber event detection., , and . CISR, page 13-16. ACM, (2014)Comparing CPU Performance Between and Within Processor Families., , and . Int. CMG Conference, page 421-430. Computer Measurement Group, (2000)Using Executable Slicing to Improve Rogue Software Detection Algorithms., , , , and . Int. J. Secur. Softw. Eng., 2 (2): 53-64 (2011)Digital forensics on a virtual machine., and . ACM Southeast Regional Conference, page 326-327. ACM, (2011)An Experimental Analysis of Windows Log Events Triggered by Malware., and . ACM Southeast Regional Conference, page 195-198. ACM, (2017)Evaluation of Random Projection for Malware Classification., , , and . SERE (Companion), page 68-73. IEEE, (2013)Evaluation of Firefox Browser Forensics Tools., and . ACM Southeast Regional Conference, page 5-12. ACM, (2017)A Comparison of Features for Android Malware Detection., , and . ACM Southeast Regional Conference, page 63-68. ACM, (2017)