|
Search the dblp DataBase
Guy G. Helmer:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les Miller
Feature Selection Using a Genetic Algorithm for Intrusion Detection. [Citation Graph (0, 0)][DBLP] GECCO, 1999, pp:1781- [Conf]
- Robyn R. Lutz, Guy G. Helmer, Michelle M. Moseman, David E. Statezni, Stephen R. Tockey
Safety Analysis of Requirements for a Product Family. [Citation Graph (0, 0)][DBLP] ICRE, 1998, pp:24-0 [Conf]
- Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les Miller
Automated discovery of concise predictive rules for intrusion detection. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2002, v:60, n:3, pp:165-175 [Journal]
- Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les Miller, Yanxin Wang
Lightweight agents for intrusion detection. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2003, v:67, n:2, pp:109-122 [Journal]
- Guy G. Helmer, Johnny S. Wong, Subhasri Madaka
Anomalous intrusion detection system for hostile Java applets. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2001, v:55, n:3, pp:273-286 [Journal]
- Yanxin Wang, Smruti Ranjan Behera, Johnny Wong, Guy G. Helmer, Vasant Honavar, Les Miller, Robyn R. Lutz, Mark Slagell
Towards the automatic generation of mobile agents for distributed intrusion detection system. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2006, v:79, n:1, pp:1-14 [Journal]
- Johnny Wong, Guy G. Helmer, Venkatraman Naganathan, Sriniwas Polavarapu, Vasant Honavar, Les Miller
SMART mobile agent facility. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2001, v:56, n:1, pp:9-22 [Journal]
- Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasant Honavar, Les Miller, Robyn R. Lutz
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. [Citation Graph (0, 0)][DBLP] Requir. Eng., 2002, v:7, n:4, pp:207-220 [Journal]
Search in 0.001secs, Finished in 0.002secs
|