|
Search the dblp DataBase
Gregg H. Gunsch:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Kevin P. Anchor, Jesse B. Zydallis, Gregg H. Gunsch, Gary B. Lamont
Different Multi-objective Evolutionary Programming Approaches for Detecting Computer Network Attacks. [Citation Graph (0, 0)][DBLP] EMO, 2003, pp:707-721 [Conf]
- David P. Biros, Gregory Fields, Gregg H. Gunsch
The Effect of External Safeguards on Human-Information System Trust in an Information Warfare Environment. [Citation Graph (0, 0)][DBLP] HICSS, 2003, pp:62- [Conf]
- Gregg H. Gunsch, Larry A. Rendell
Opportunistic Constructive Induction. [Citation Graph (0, 0)][DBLP] ML, 1991, pp:147-152 [Conf]
- Paul D. Williams, Kevin P. Anchor, John L. Bebo, Gregg H. Gunsch, Gary B. Lamont
CDIS: Towards a Computer Immune System for Detecting Network Intrusions. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 2001, pp:117-133 [Conf]
- Jacob T. Jackson, Gregg H. Gunsch, Roger L. Claypoole Jr., Gary B. Lamont
Wavelet-based steganalysis using a computational immune system approach. [Citation Graph (0, 0)][DBLP] VCIP, 2003, pp:1884-1894 [Conf]
- Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch, Gary B. Lamont
An artificial immune system architecture for computer security applications. [Citation Graph (0, 0)][DBLP] IEEE Trans. Evolutionary Computation, 2002, v:6, n:3, pp:252-280 [Journal]
Novel steganography detection using an artificial immune system approach. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|