|
Search the dblp DataBase
Jeffrey Undercoffer:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- James Butler, Jeffrey Undercoffer, John Pinkston
Hidden Processes: The Implication for Intrusion Detection. [Citation Graph (0, 0)][DBLP] IAW, 2003, pp:116-121 [Conf]
- Filip Perich, Jeffrey Undercoffer, Lalana Kagal, Anupam Joshi, Timothy W. Finin, Yelena Yesha
In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP] MobiQuitous, 2004, pp:326-334 [Conf]
- Jeffrey Undercoffer, Anupam Joshi, John Pinkston
Modeling Computer Attacks: An Ontology for Intrusion Detection. [Citation Graph (0, 0)][DBLP] RAID, 2003, pp:113-135 [Conf]
- Sasikanth Avancha, Jeffrey Undercoffer, Anupam Joshi, John Pinkston
Secure sensor networks for perimeter protection. [Citation Graph (0, 0)][DBLP] Computer Networks, 2003, v:43, n:4, pp:421-435 [Journal]
- Jeffrey Undercoffer, Filip Perich, Andrej Cedilnik, Lalana Kagal, Anupam Joshi
A Secure Infrastructure for Service Discovery and Access in Pervasive Computing. [Citation Graph (0, 0)][DBLP] MONET, 2003, v:8, n:2, pp:113-125 [Journal]
Search in 0.001secs, Finished in 0.001secs
|