Search the dblp DataBase
James H. Graham :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Porter Eugene Smith , James H. Graham A Simple Balanced Search Tree. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer Science, 1993, pp:461-465 [Conf ] Yingbing Yu , James H. Graham Computer Immunology and Neural Network Models for Masquerader Detection. [Citation Graph (0, 0)][DBLP ] CAINE, 2004, pp:1-6 [Conf ] James H. Graham , Jason Walton Event Processing Software for Intelligent Security Monitoring and Alarm System. [Citation Graph (0, 0)][DBLP ] CAINE, 2005, pp:55-60 [Conf ] Sandip C. Patel , James H. Graham Security Considerations in DNP3 SCADA Systems. [Citation Graph (0, 0)][DBLP ] CAINE, 2004, pp:73-78 [Conf ] Sandip C. Patel , James H. Graham , Patricia A. S. Ralston , Roberto Tantalean-Carrasco Secure SCADA Communications, Monitoring and Control over the Internet. [Citation Graph (0, 0)][DBLP ] CAINE, 2005, pp:169-174 [Conf ] Jeffrey L. Hieb , James H. Graham Security-enhanced remote terminal units for SCADA networks. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:271-276 [Conf ] Sandip C. Patel , James H. Graham , Patricia A. S. Ralston Security enhancement for SCADA communication protocols using augmented vulnerability trees. [Citation Graph (0, 0)][DBLP ] CAINE, 2006, pp:244-251 [Conf ] James H. Graham , Eric Kuhl , Jonathan Nida Agent-Based Architecture for Intelligent Semi-Autonomous Robots. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2005, pp:484-487 [Conf ] Jeffrey L. Hieb , James H. Graham Anomaly-Based Intrusion Monitoring Using a Dynamic Honeypot. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2005, pp:184-189 [Conf ] Jeffrey L. Hieb , James H. Graham Dynamic Authentication Using Keystroke Biometrics. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2006, pp:337-342 [Conf ] Nathan P. Johnson , James H. Graham An Application of Grid Computing to Pharmacophore Discovery Using Inductive Logic Programming. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2006, pp:418-423 [Conf ] Wen-Bin Yu , James H. Graham A Multiple Agent Architecture for Demand Forecasting in Electronic Commerce Supply Chain Systems. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2002, pp:462-466 [Conf ] Essam M. Hamed , James H. Graham Fuzzy Threat Evaluation in Computer Security. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2002, pp:389-393 [Conf ] James H. Graham , Patricia A. S. Ralston Computer-based monitoring and fault diagnosis for chemical processes. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2000, pp:309-312 [Conf ] James H. Graham FMECA Control for Software Development. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:93-96 [Conf ] James H. Graham , C. David Page Jr. , Ahmed H. Kamal Accelerating the Drug Design Process through Parallel Inductive Logic Programming Data Mining. [Citation Graph (0, 0)][DBLP ] CSB, 2003, pp:400-402 [Conf ] Wen-Bin Yu , James H. Graham Call Center Demand Forecasting using Intelligent Agents. [Citation Graph (0, 0)][DBLP ] IASSE, 2003, pp:63-66 [Conf ] James H. Graham , Jonathan Nida Advanced Simulation Architecture for Intelligent Autonomous Robots. [Citation Graph (0, 0)][DBLP ] IASSE, 2003, pp:59-62 [Conf ] James H. Graham , Jian Guan Intelligent Diagnostics in Robotics and Integrated Manufacturing Systems. [Citation Graph (0, 0)][DBLP ] ICRA (2), 1993, pp:174-179 [Conf ] Terrence P. Fries , James H. Graham An Agent-Based Approach to Robust Switching Between Abstraction Levels for Fault Diagnosis. [Citation Graph (0, 0)][DBLP ] SARA, 2000, pp:303-308 [Conf ] Adel Said Elmaghraby , Sherif A. Elfayoumy , Irfan S. Karachiwala , James H. Graham , Ahmed Z. Emam , AlaaEldin Sleem Web-based performance visualization of distributed discrete event simulation. [Citation Graph (0, 0)][DBLP ] Winter Simulation Conference, 1999, pp:1618-1623 [Conf ] James H. Graham , Irfan S. Karachiwala , Adel Said Elmaghraby Evaluation of a Prototype Visualization for Distributed Simulations. [Citation Graph (0, 0)][DBLP ] Winter Simulation Conference, 1998, pp:1469-1478 [Conf ] Carol S. Russell , Adel Said Elmaghraby , James H. Graham An Investigation of a Standard Simulation-Knowledge Interface. [Citation Graph (0, 0)][DBLP ] Winter Simulation Conference, 1992, pp:807-815 [Conf ] James H. Graham Book Review. [Citation Graph (0, 0)][DBLP ] Artif. Intell. Rev., 1995, v:9, n:6, pp:423- [Journal ] James H. Graham , R. N. Horton A note on determining the measure of coincidence of segments of a given conic. [Citation Graph (0, 0)][DBLP ] Computer-Aided Design, 1971, v:3, n:3, pp:16-17 [Journal ] James H. Graham , Patricia A. S. Ralston Intelligent Computer-Based Monitoring and Fault Isolation for Industrial Processes. [Citation Graph (0, 0)][DBLP ] I. J. Comput. Appl., 2002, v:9, n:3, pp:147-157 [Journal ] Ahmed H. Kamal , James H. Graham , C. David Page Jr. A Parallel Inductive Logic Programming Data Mining System for Drug Discovery. [Citation Graph (0, 0)][DBLP ] I. J. Comput. Appl., 2003, v:10, n:3, pp:161-170 [Journal ] James H. Graham , Thaddeus F. Kadela Parallel Algorithms and Architectures for Optimal State Estimation. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1985, v:34, n:11, pp:1061-1068 [Journal ] Sherif A. Elfayoumy , James H. Graham An Agent-based Architecture for Performance Tuning: Parallel Discrete-event Simulations Case Study. [Citation Graph (0, 0)][DBLP ] ISCA PDCS, 2001, pp:401-406 [Conf ] James H. Graham , Mostafa S. Mostafa , Benjamin Arazi , Ashraf Tantawy , Jeffrey L. Hieb , Patricia A. S. Ralston , Sandip C. Patel Improvements in SCADA and DCS Systems Security. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2007, pp:194-200 [Conf ] Patricia A. S. Ralston , James H. Graham , Gail W. DePuy , Chris Arnold , Sean Uhl Intelligent Chemometrics-Based Approach for Chemical Process Fault Monitoring and Diagnosis. [Citation Graph (0, 0)][DBLP ] ISCA Conference on Intelligent Systems, 2002, pp:91-96 [Conf ] Ahmed H. Kamal , James H. Graham , C. David Page Jr. An Approach to Parallel Data Mining for Pharmacophore Discovery. [Citation Graph (0, 0)][DBLP ] ISCA Conference on Intelligent Systems, 2001, pp:100-103 [Conf ] James H. Graham , Christopher Short , Kamalesh Gandham , Sandra McPherson , Mark Baker Multi-level Biometric-Based Authentication System. [Citation Graph (0, 0)][DBLP ] ISCA Conference on Intelligent Systems, 2002, pp:149-154 [Conf ] Essam M. Hamed , James H. Graham , Adel Said Elmaghraby Computer Systems Threat Evaluation: An Agent-based and Fuzzy Logic Intrusion Detection Architecture. [Citation Graph (0, 0)][DBLP ] ISCA Conference on Intelligent Systems, 2001, pp:23-26 [Conf ] Reliability through Replication and Permutation on Desktop Grids. [Citation Graph (, )][DBLP ] Testing Security Enhanced SCADA Communication Protocols. [Citation Graph (, )][DBLP ] Identity Management for Advanced Health Care Systems. [Citation Graph (, )][DBLP ] Design of a Hierarchical Principal Component Analysis System for Field Intrusion Detection. [Citation Graph (, )][DBLP ] Double Secrecy: An Enhanced Cryptographic Approach for SCADA System Security. [Citation Graph (, )][DBLP ] Intrusion Detection System for SCADA Networks. [Citation Graph (, )][DBLP ] A Method for Detecting Windows Rootkits. [Citation Graph (, )][DBLP ] An Ontological Model for Assessing Security Risk Impact in SCADA Systems. [Citation Graph (, )][DBLP ] Predicting Makespan with Latin Square Replication on Computational Grids. [Citation Graph (, )][DBLP ] Challenge - Construction of an Adequate Digital Forensics Testbed. [Citation Graph (, )][DBLP ] High Performance Computing: An Agent-based Approach. [Citation Graph (, )][DBLP ] Knowledge Based Planning of Communications Networks to Support Military Ground Operations. [Citation Graph (, )][DBLP ] Security Enhancements for Distributed Control Systems. [Citation Graph (, )][DBLP ] Computational Prediction of Genes Translationally Regulated by Cytoplasmic Polyadenylation Elements. [Citation Graph (, )][DBLP ] Improving the cyber security of SCADA communication networks. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.007secs