Author of the publication

The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection.

, , and . RAID, volume 2516 of Lecture Notes in Computer Science, page 307-326. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool., , and . VizSEC, volume 5210 of Lecture Notes in Computer Science, page 44-59. Springer, (2008)Book Review: Neural Networks, a Comprehensive Foundation, by Simon Haykin.. Int. J. Neural Syst., 5 (4): 363-364 (1994)Improving Intrusion Detection Performance using Keyword Selection and Neural Networks., and . Recent Advances in Intrusion Detection, (1999)Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR., , , , and . VizSEC, page 22-33. ACM, (2010)Modeling Modern Network Attacks and Countermeasures Using Attack Graphs., , , , and . ACSAC, page 117-126. IEEE Computer Society, (2009)A Micropower Analog VLSI HMM State Decoder for Wordspotting., , and . NIPS, page 727-733. MIT Press, (1996)Improving intrusion detection performance using keyword selection and neural networks., and . Comput. Networks, 34 (4): 597-603 (2000)Results of the DARPA 1998 Offline Intrusion Detection Evaluation., , , , , , and . Recent Advances in Intrusion Detection, (1999)A neural net approach to speech recognition., , and . ICASSP, page 99-102. IEEE, (1988)Testing static analysis tools using exploitable buffer overflows from open source code., , and . SIGSOFT FSE, page 97-106. ACM, (2004)