|
Search the dblp DataBase
John Haggerty:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- John Haggerty, Qi Shi, Madjid Merabti
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. [Citation Graph (0, 0)][DBLP] ACSAC, 2002, pp:413-422 [Conf]
- Sudath Indrasinghe, Rubem Pereira, John Haggerty
Conflict Free Address Allocation Mechanism for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:852-857 [Conf]
- Jacques J. Vidal, John Haggerty
Synchronization in Neural Nets. [Citation Graph (0, 0)][DBLP] NIPS, 1987, pp:824-829 [Conf]
- John Haggerty, Qi Shi, Madjid Merabti
The Threat From Within -An Analysis of Attacks on anInternal Network. [Citation Graph (0, 0)][DBLP] SEC, 2002, pp:133-146 [Conf]
- John Haggerty, Qi Shi, Madjid Merabti
Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks. [Citation Graph (0, 0)][DBLP] SEC, 2005, pp:327-342 [Conf]
Protocol Specification for Conflict Free MANET Address Allocation Mechanisms. [Citation Graph (, )][DBLP]
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints. [Citation Graph (, )][DBLP]
Disjointed Conflict Free Address Auto-Configuration for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|