The SCEAS System
Navigation Menu

Search the dblp DataBase


John Haggerty: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John Haggerty, Qi Shi, Madjid Merabti
    Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:413-422 [Conf]
  2. Sudath Indrasinghe, Rubem Pereira, John Haggerty
    Conflict Free Address Allocation Mechanism for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:852-857 [Conf]
  3. Jacques J. Vidal, John Haggerty
    Synchronization in Neural Nets. [Citation Graph (0, 0)][DBLP]
    NIPS, 1987, pp:824-829 [Conf]
  4. John Haggerty, Qi Shi, Madjid Merabti
    The Threat From Within -An Analysis of Attacks on anInternal Network. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:133-146 [Conf]
  5. John Haggerty, Qi Shi, Madjid Merabti
    Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:327-342 [Conf]

  6. Protocol Specification for Conflict Free MANET Address Allocation Mechanisms. [Citation Graph (, )][DBLP]

  7. FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints. [Citation Graph (, )][DBLP]

  8. Disjointed Conflict Free Address Auto-Configuration for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002