The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

James H. Graham: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Porter Eugene Smith, James H. Graham
    A Simple Balanced Search Tree. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1993, pp:461-465 [Conf]
  2. Yingbing Yu, James H. Graham
    Computer Immunology and Neural Network Models for Masquerader Detection. [Citation Graph (0, 0)][DBLP]
    CAINE, 2004, pp:1-6 [Conf]
  3. James H. Graham, Jason Walton
    Event Processing Software for Intelligent Security Monitoring and Alarm System. [Citation Graph (0, 0)][DBLP]
    CAINE, 2005, pp:55-60 [Conf]
  4. Sandip C. Patel, James H. Graham
    Security Considerations in DNP3 SCADA Systems. [Citation Graph (0, 0)][DBLP]
    CAINE, 2004, pp:73-78 [Conf]
  5. Sandip C. Patel, James H. Graham, Patricia A. S. Ralston, Roberto Tantalean-Carrasco
    Secure SCADA Communications, Monitoring and Control over the Internet. [Citation Graph (0, 0)][DBLP]
    CAINE, 2005, pp:169-174 [Conf]
  6. Jeffrey L. Hieb, James H. Graham
    Security-enhanced remote terminal units for SCADA networks. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:271-276 [Conf]
  7. Sandip C. Patel, James H. Graham, Patricia A. S. Ralston
    Security enhancement for SCADA communication protocols using augmented vulnerability trees. [Citation Graph (0, 0)][DBLP]
    CAINE, 2006, pp:244-251 [Conf]
  8. James H. Graham, Eric Kuhl, Jonathan Nida
    Agent-Based Architecture for Intelligent Semi-Autonomous Robots. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:484-487 [Conf]
  9. Jeffrey L. Hieb, James H. Graham
    Anomaly-Based Intrusion Monitoring Using a Dynamic Honeypot. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:184-189 [Conf]
  10. Jeffrey L. Hieb, James H. Graham
    Dynamic Authentication Using Keystroke Biometrics. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2006, pp:337-342 [Conf]
  11. Nathan P. Johnson, James H. Graham
    An Application of Grid Computing to Pharmacophore Discovery Using Inductive Logic Programming. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2006, pp:418-423 [Conf]
  12. Wen-Bin Yu, James H. Graham
    A Multiple Agent Architecture for Demand Forecasting in Electronic Commerce Supply Chain Systems. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2002, pp:462-466 [Conf]
  13. Essam M. Hamed, James H. Graham
    Fuzzy Threat Evaluation in Computer Security. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2002, pp:389-393 [Conf]
  14. James H. Graham, Patricia A. S. Ralston
    Computer-based monitoring and fault diagnosis for chemical processes. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2000, pp:309-312 [Conf]
  15. James H. Graham
    FMECA Control for Software Development. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2005, pp:93-96 [Conf]
  16. James H. Graham, C. David Page Jr., Ahmed H. Kamal
    Accelerating the Drug Design Process through Parallel Inductive Logic Programming Data Mining. [Citation Graph (0, 0)][DBLP]
    CSB, 2003, pp:400-402 [Conf]
  17. Wen-Bin Yu, James H. Graham
    Call Center Demand Forecasting using Intelligent Agents. [Citation Graph (0, 0)][DBLP]
    IASSE, 2003, pp:63-66 [Conf]
  18. James H. Graham, Jonathan Nida
    Advanced Simulation Architecture for Intelligent Autonomous Robots. [Citation Graph (0, 0)][DBLP]
    IASSE, 2003, pp:59-62 [Conf]
  19. James H. Graham, Jian Guan
    Intelligent Diagnostics in Robotics and Integrated Manufacturing Systems. [Citation Graph (0, 0)][DBLP]
    ICRA (2), 1993, pp:174-179 [Conf]
  20. Terrence P. Fries, James H. Graham
    An Agent-Based Approach to Robust Switching Between Abstraction Levels for Fault Diagnosis. [Citation Graph (0, 0)][DBLP]
    SARA, 2000, pp:303-308 [Conf]
  21. Adel Said Elmaghraby, Sherif A. Elfayoumy, Irfan S. Karachiwala, James H. Graham, Ahmed Z. Emam, AlaaEldin Sleem
    Web-based performance visualization of distributed discrete event simulation. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 1999, pp:1618-1623 [Conf]
  22. James H. Graham, Irfan S. Karachiwala, Adel Said Elmaghraby
    Evaluation of a Prototype Visualization for Distributed Simulations. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 1998, pp:1469-1478 [Conf]
  23. Carol S. Russell, Adel Said Elmaghraby, James H. Graham
    An Investigation of a Standard Simulation-Knowledge Interface. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 1992, pp:807-815 [Conf]
  24. James H. Graham
    Book Review. [Citation Graph (0, 0)][DBLP]
    Artif. Intell. Rev., 1995, v:9, n:6, pp:423- [Journal]
  25. James H. Graham, R. N. Horton
    A note on determining the measure of coincidence of segments of a given conic. [Citation Graph (0, 0)][DBLP]
    Computer-Aided Design, 1971, v:3, n:3, pp:16-17 [Journal]
  26. James H. Graham, Patricia A. S. Ralston
    Intelligent Computer-Based Monitoring and Fault Isolation for Industrial Processes. [Citation Graph (0, 0)][DBLP]
    I. J. Comput. Appl., 2002, v:9, n:3, pp:147-157 [Journal]
  27. Ahmed H. Kamal, James H. Graham, C. David Page Jr.
    A Parallel Inductive Logic Programming Data Mining System for Drug Discovery. [Citation Graph (0, 0)][DBLP]
    I. J. Comput. Appl., 2003, v:10, n:3, pp:161-170 [Journal]
  28. James H. Graham, Thaddeus F. Kadela
    Parallel Algorithms and Architectures for Optimal State Estimation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1985, v:34, n:11, pp:1061-1068 [Journal]
  29. Sherif A. Elfayoumy, James H. Graham
    An Agent-based Architecture for Performance Tuning: Parallel Discrete-event Simulations Case Study. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2001, pp:401-406 [Conf]
  30. James H. Graham, Mostafa S. Mostafa, Benjamin Arazi, Ashraf Tantawy, Jeffrey L. Hieb, Patricia A. S. Ralston, Sandip C. Patel
    Improvements in SCADA and DCS Systems Security. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2007, pp:194-200 [Conf]
  31. Patricia A. S. Ralston, James H. Graham, Gail W. DePuy, Chris Arnold, Sean Uhl
    Intelligent Chemometrics-Based Approach for Chemical Process Fault Monitoring and Diagnosis. [Citation Graph (0, 0)][DBLP]
    ISCA Conference on Intelligent Systems, 2002, pp:91-96 [Conf]
  32. Ahmed H. Kamal, James H. Graham, C. David Page Jr.
    An Approach to Parallel Data Mining for Pharmacophore Discovery. [Citation Graph (0, 0)][DBLP]
    ISCA Conference on Intelligent Systems, 2001, pp:100-103 [Conf]
  33. James H. Graham, Christopher Short, Kamalesh Gandham, Sandra McPherson, Mark Baker
    Multi-level Biometric-Based Authentication System. [Citation Graph (0, 0)][DBLP]
    ISCA Conference on Intelligent Systems, 2002, pp:149-154 [Conf]
  34. Essam M. Hamed, James H. Graham, Adel Said Elmaghraby
    Computer Systems Threat Evaluation: An Agent-based and Fuzzy Logic Intrusion Detection Architecture. [Citation Graph (0, 0)][DBLP]
    ISCA Conference on Intelligent Systems, 2001, pp:23-26 [Conf]

  35. Reliability through Replication and Permutation on Desktop Grids. [Citation Graph (, )][DBLP]


  36. Testing Security Enhanced SCADA Communication Protocols. [Citation Graph (, )][DBLP]


  37. Identity Management for Advanced Health Care Systems. [Citation Graph (, )][DBLP]


  38. Design of a Hierarchical Principal Component Analysis System for Field Intrusion Detection. [Citation Graph (, )][DBLP]


  39. Double Secrecy: An Enhanced Cryptographic Approach for SCADA System Security. [Citation Graph (, )][DBLP]


  40. Intrusion Detection System for SCADA Networks. [Citation Graph (, )][DBLP]


  41. A Method for Detecting Windows Rootkits. [Citation Graph (, )][DBLP]


  42. An Ontological Model for Assessing Security Risk Impact in SCADA Systems. [Citation Graph (, )][DBLP]


  43. Predicting Makespan with Latin Square Replication on Computational Grids. [Citation Graph (, )][DBLP]


  44. Challenge - Construction of an Adequate Digital Forensics Testbed. [Citation Graph (, )][DBLP]


  45. High Performance Computing: An Agent-based Approach. [Citation Graph (, )][DBLP]


  46. Knowledge Based Planning of Communications Networks to Support Military Ground Operations. [Citation Graph (, )][DBLP]


  47. Security Enhancements for Distributed Control Systems. [Citation Graph (, )][DBLP]


  48. Computational Prediction of Genes Translationally Regulated by Cytoplasmic Polyadenylation Elements. [Citation Graph (, )][DBLP]


  49. Improving the cyber security of SCADA communication networks. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.009secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002