Author of the publication

LINEBACKER: LINE-Speed Bio-Inspired Analysis and Characterization for Event Recognition.

, , , , , , , , and . IEEE Symposium on Security and Privacy Workshops, page 88-95. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LINEBACKER: LINE-Speed Bio-Inspired Analysis and Characterization for Event Recognition., , , , , , , , and . IEEE Symposium on Security and Privacy Workshops, page 88-95. IEEE Computer Society, (2016)A generalized bio-inspired method for discovering sequence-based signatures., , , , and . ISI, page 330-332. IEEE, (2013)An organic model for detecting cyber-events., , and . CSIIRW, page 66. ACM, (2010)Bioinformatics Resource Manager: a systems biology web tool for microRNA and omics data integration., , , , , , , , and . BMC Bioinform., 20 (1): 255 (December 2019)A Biosequence-Based Approach to Software Characterization., , , and . IEEE Symposium on Security and Privacy Workshops, page 118-125. IEEE Computer Society, (2016)Northwest Trajectory Analysis Capability: A Platform for Enhancing Biophysics Analysis., , , , , , , , , and 1 other author(s). BIOCOMP, page 558-562. CSREA Press, (2008)A Secure Web Application Providing Public Access to High-Performance Data Intensive Scientific Resources - ScalaBLAST Web Application., , and . WEBIST (1), page 244-251. INSTICC Press, (2008)Behavior-dependent Routing: Responding to Anomalies with Automated Low-cost Measures., , , , , , , , and . SafeConfig@CCS, page 55-58. ACM, (2015)Analytics challenge - High-throughput visual analytics biological sciences: turning data into knowledge., , , , , , , , , and 2 other author(s). SC, page 299. ACM Press, (2006)Behavior Models to Express and Share Threat Information., , and . IT Prof., 17 (5): 12-14 (2015)