|
Search the dblp DataBase
Carrie Gates:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Carrie Gates, Sriram Subramanian, Carl Gutwin
DJs' perspectives on interaction and awareness in nightclubs. [Citation Graph (0, 0)][DBLP] Conference on Designing Interactive Systems, 2006, pp:70-79 [Conf]
- Jacob Slonim, Theodore Chiasson, Carrie Gates
Creating an Electronic Commerce Device Which Promotes Universal Access: The KALI Project. [Citation Graph (0, 0)][DBLP] DCW, 2000, pp:2-12 [Conf]
- Carrie Gates, Joshua J. McNutt, Joseph B. Kadane, Marc I. Kellner
Scan Detection on Very Large Networks Using Logistic Regression Modeling. [Citation Graph (0, 0)][DBLP] ISCC, 2006, pp:402-408 [Conf]
- Jacob Slonim, Theodore Chiasson, Carrie Gates, Michael McAllister
An Extensible, Human-Centric Framework That Promotes Universal Access to Electronic Commerce. [Citation Graph (0, 0)][DBLP] ISEC, 2001, pp:116-126 [Conf]
- Carrie Gates, Michael Collins, Michael Duggan, Andrew Kompanek, Mark Thomas
More Netflow Tools for Performance and Security. [Citation Graph (0, 0)][DBLP] LISA, 2004, pp:121-132 [Conf]
- Carrie Gates, Jason Rouse
The Yearly Review, or How to Evaluate Your Sys Admin. [Citation Graph (0, 0)][DBLP] LISA, 2003, pp:95-104 [Conf]
- Brian Trammell, Carrie Gates
NAF: The NetSA Aggregated Flow Tool Suite. [Citation Graph (0, 0)][DBLP] LISA, 2006, pp:221-231 [Conf]
- Carrie Gates, Jacob Slonim
Owner-controlled information. [Citation Graph (0, 0)][DBLP] NSPW, 2003, pp:103-111 [Conf]
- Carrie Gates, Tara Whalen
Profiling the defenders. [Citation Graph (0, 0)][DBLP] NSPW, 2004, pp:107-114 [Conf]
- John McHugh, Carrie Gates
Locality: a new paradigm for thinking about normal behavior and outsider threat. [Citation Graph (0, 0)][DBLP] NSPW, 2003, pp:3-10 [Conf]
- Tara Whalen, Carrie Gates
Defender Personality Traits. [Citation Graph (0, 0)][DBLP] WISI, 2006, pp:85-90 [Conf]
- Carrie Gates, Carol Taylor
Challenging the anomaly detection paradigm: a provocative discussion. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:21-29 [Conf]
- Matthew Dunlop, Carrie Gates, Cynthia Wong, Chenxi Wang
SWorD - A Simple Worm Detection Scheme. [Citation Graph (0, 0)][DBLP] OTM Conferences (2), 2007, pp:1752-1769 [Conf]
An access control reference architecture. [Citation Graph (, )][DBLP]
The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors. [Citation Graph (, )][DBLP]
Case Studies of an Insider Framework. [Citation Graph (, )][DBLP]
Coordinated Scan Detection. [Citation Graph (, )][DBLP]
A case study in testing a network security algorithm. [Citation Graph (, )][DBLP]
The security and privacy implications of using social networks to deliver healthcare. [Citation Graph (, )][DBLP]
Search in 0.075secs, Finished in 0.077secs
|