The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Carrie Gates: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Carrie Gates, Sriram Subramanian, Carl Gutwin
    DJs' perspectives on interaction and awareness in nightclubs. [Citation Graph (0, 0)][DBLP]
    Conference on Designing Interactive Systems, 2006, pp:70-79 [Conf]
  2. Jacob Slonim, Theodore Chiasson, Carrie Gates
    Creating an Electronic Commerce Device Which Promotes Universal Access: The KALI Project. [Citation Graph (0, 0)][DBLP]
    DCW, 2000, pp:2-12 [Conf]
  3. Carrie Gates, Joshua J. McNutt, Joseph B. Kadane, Marc I. Kellner
    Scan Detection on Very Large Networks Using Logistic Regression Modeling. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:402-408 [Conf]
  4. Jacob Slonim, Theodore Chiasson, Carrie Gates, Michael McAllister
    An Extensible, Human-Centric Framework That Promotes Universal Access to Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    ISEC, 2001, pp:116-126 [Conf]
  5. Carrie Gates, Michael Collins, Michael Duggan, Andrew Kompanek, Mark Thomas
    More Netflow Tools for Performance and Security. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:121-132 [Conf]
  6. Carrie Gates, Jason Rouse
    The Yearly Review, or How to Evaluate Your Sys Admin. [Citation Graph (0, 0)][DBLP]
    LISA, 2003, pp:95-104 [Conf]
  7. Brian Trammell, Carrie Gates
    NAF: The NetSA Aggregated Flow Tool Suite. [Citation Graph (0, 0)][DBLP]
    LISA, 2006, pp:221-231 [Conf]
  8. Carrie Gates, Jacob Slonim
    Owner-controlled information. [Citation Graph (0, 0)][DBLP]
    NSPW, 2003, pp:103-111 [Conf]
  9. Carrie Gates, Tara Whalen
    Profiling the defenders. [Citation Graph (0, 0)][DBLP]
    NSPW, 2004, pp:107-114 [Conf]
  10. John McHugh, Carrie Gates
    Locality: a new paradigm for thinking about normal behavior and outsider threat. [Citation Graph (0, 0)][DBLP]
    NSPW, 2003, pp:3-10 [Conf]
  11. Tara Whalen, Carrie Gates
    Defender Personality Traits. [Citation Graph (0, 0)][DBLP]
    WISI, 2006, pp:85-90 [Conf]
  12. Carrie Gates, Carol Taylor
    Challenging the anomaly detection paradigm: a provocative discussion. [Citation Graph (0, 0)][DBLP]
    NSPW, 2006, pp:21-29 [Conf]
  13. Matthew Dunlop, Carrie Gates, Cynthia Wong, Chenxi Wang
    SWorD - A Simple Worm Detection Scheme. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2007, pp:1752-1769 [Conf]

  14. An access control reference architecture. [Citation Graph (, )][DBLP]


  15. The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors. [Citation Graph (, )][DBLP]


  16. Case Studies of an Insider Framework. [Citation Graph (, )][DBLP]


  17. Coordinated Scan Detection. [Citation Graph (, )][DBLP]


  18. A case study in testing a network security algorithm. [Citation Graph (, )][DBLP]


  19. The security and privacy implications of using social networks to deliver healthcare. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002