The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Transactions on Systems, Man, and Cybernetics, Part A
2001, volume: 31, number: 4


  1. Editorial protecting the network: research directions in information assurance. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:249-252 [Journal]
  2. Yong Guan, Xinwen Fu, Dong Xuan, P. U. Shenoy, Riccardo Bettati, Wei Zhao
    NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:253-265 [Journal]
  3. Nong Ye, Xiangyang Li, Qiang Chen, Syed Masum Emran, Mingming Xu
    Probabilistic techniques for intrusion detection based on computer audit data. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:266-274 [Journal]
  4. Robert K. Cunningham, Richard Lippmann, Seth E. Webster
    Detecting and displaying novel computer attacks with Macroscope. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:275-281 [Journal]
  5. Yong Xiong, S. Liu, P. Sun
    On the defense of the distributed denial of service attacks: an on-off feedback control approach. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:282-293 [Journal]
  6. Susan C. Lee, David V. Heinbuch
    Training a neural-network based intrusion detector to recognize novel attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:294-299 [Journal]
  7. Chandana Lala, Brajendra Panda
    Evaluating damage from cyber attacks: a model and analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:300-310 [Journal]
  8. Donald E. Brown, Louise E. Gunderson
    Using clustering to discover the preferences of computer criminals . [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:311-318 [Journal]
  9. Kenneth P. Birman
    Technology challenges for virtual overlay networks. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:319-327 [Journal]
  10. D. A. Nash, Daniel Ragsdale
    Simulation of self-similarity in network utilization patterns as a precursor to automated testing of intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:327-331 [Journal]
  11. D. L. Kewley, J. F. Bouchard
    DARPA Information Assurance Program dynamic defense experiment summary. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:331-336 [Journal]
  12. Gio Wiederhold
    Collaboration requirements: a point of failure in protecting information. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:336-342 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002