Author of the publication

A graph analytic metric for mitigating advanced persistent threat.

, and . ISI, page 129-133. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Flow, the FFT, and the CRAY T3E., , , , , and . PPSC, (1999)Applications in Data-Intensive Computing., , , , , , , , , and 12 other author(s). Adv. Comput., (2010)Automatic Generation and Implementation of FFT Algorithms., and . PPSC, (1999)A Graph-Based Impact Metric for Mitigating Lateral Movement Cyber Attacks., , and . SafeConfig@CCS, page 45-52. ACM, (2016)On the Automatic Generation of Data Distributions., , , , , and . SIGPLAN Workshop, page 82. ACM, (1992)Multilinear algebra and parallel programming., , and . SC, page 20-31. IEEE Computer Society, (1990)Towards a network-of-networks framework for cyber security., , , , , , and . ISI, page 106-108. IEEE, (2013)Genomic evidence for the Pleistocene and recent population history of Native Americans, , , , , , , , , and 91 other author(s). Science, (2015)Graph coarsening for path finding in cybersecurity graphs., , and . CSIIRW, page 7. ACM, (2013)Multilinear algebra and parallel programming., , and . J. Supercomput., 5 (2-3): 189-217 (1991)