The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gregg H. Gunsch: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kevin P. Anchor, Jesse B. Zydallis, Gregg H. Gunsch, Gary B. Lamont
    Different Multi-objective Evolutionary Programming Approaches for Detecting Computer Network Attacks. [Citation Graph (0, 0)][DBLP]
    EMO, 2003, pp:707-721 [Conf]
  2. David P. Biros, Gregory Fields, Gregg H. Gunsch
    The Effect of External Safeguards on Human-Information System Trust in an Information Warfare Environment. [Citation Graph (0, 0)][DBLP]
    HICSS, 2003, pp:62- [Conf]
  3. Gregg H. Gunsch, Larry A. Rendell
    Opportunistic Constructive Induction. [Citation Graph (0, 0)][DBLP]
    ML, 1991, pp:147-152 [Conf]
  4. Paul D. Williams, Kevin P. Anchor, John L. Bebo, Gregg H. Gunsch, Gary B. Lamont
    CDIS: Towards a Computer Immune System for Detecting Network Intrusions. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:117-133 [Conf]
  5. Jacob T. Jackson, Gregg H. Gunsch, Roger L. Claypoole Jr., Gary B. Lamont
    Wavelet-based steganalysis using a computational immune system approach. [Citation Graph (0, 0)][DBLP]
    VCIP, 2003, pp:1884-1894 [Conf]
  6. Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch, Gary B. Lamont
    An artificial immune system architecture for computer security applications. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Evolutionary Computation, 2002, v:6, n:3, pp:252-280 [Journal]

  7. Novel steganography detection using an artificial immune system approach. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002