Author of the publication

Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations.

, , , , and . VizSEC, page 9. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating the Utility of Single Field Anonymization Polices by the IDS Metric : Towards measuring the trade off between Utility and Security, and . CoRR, (2007)A unified framework for multi-agent agreement., and . AAMAS, page 21. IFAAMAS, (2007)Communications-Based Automated Assessment of Team Cognitive Performance., , , and . HCI (20), volume 6780 of Lecture Notes in Computer Science, page 325-334. Springer, (2011)The Impact of Attitude Resolve on Population Wide Attitude Change., , , and . SBP, volume 7227 of Lecture Notes in Computer Science, page 322-330. Springer, (2012)A Study of Daily Sample Composition on Amazon Mechanical Turk.. SBP, volume 9021 of Lecture Notes in Computer Science, page 333-338. Springer, (2015)Conflict and Communication in Massively-Multiplayer Online Games., , , , and . SBP, volume 9021 of Lecture Notes in Computer Science, page 65-74. Springer, (2015)Consensus under Constraints: Modeling the Great English Vowel Shift., , and . SBP, volume 7227 of Lecture Notes in Computer Science, page 1-8. Springer, (2012)Humans vs. Bots: investigating models of behavior in the iterated Prisoner's dilemma., , , and . SpringSim, page 1-12. IEEE, (2020)FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs., , and . LISA, page 63-77. USENIX, (2006)Predicting Social Ties in Massively Multiplayer Online Games., and . SBP, volume 8393 of Lecture Notes in Computer Science, page 95-102. Springer, (2014)