The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Steven Noel: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Steven Noel, Sushil Jajodia
    Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:160-169 [Conf]
  2. Steven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs
    Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:86-95 [Conf]
  3. Steven Noel, Eric Robertson, Sushil Jajodia
    Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:350-359 [Conf]
  4. Ronald W. Ritchey, Brian O'Berry, Steven Noel
    Representing TCP/IP Connectivity For Topological Analysis of Network Security. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:25-34 [Conf]
  5. Steven Noel, Vijay V. Raghavan, Chee-Hung Henry Chu
    Visualizing Association Mining Results through Hierarchical Clusters. [Citation Graph (0, 0)][DBLP]
    ICDM, 2001, pp:425-432 [Conf]
  6. Steven Noel, Chee-Hung Henry Chu, Vijay Raghavan
    Visualization of Document Co-Citation Counts. [Citation Graph (0, 0)][DBLP]
    IV, 2002, pp:691-696 [Conf]
  7. Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia
    Multiple Coordinated Views for Network Attack Graphs. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:12- [Conf]
  8. Steven Noel, Sushil Jajodia
    Managing attack graph complexity through visual hierarchical aggregation. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2004, pp:109-118 [Conf]
  9. Lingyu Wang, Steven Noel, Sushil Jajodia
    Minimum-cost network hardening using attack graphs. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:18, pp:3812-3824 [Journal]
  10. Steven Noel, Chee-Hung Henry Chu, Vijay Raghavan
    Co-Citation count vs correlation for influence network visualization. [Citation Graph (0, 0)][DBLP]
    Information Visualization, 2003, v:2, n:3, pp:160-170 [Journal]
  11. Harold Szu, Steven Noel, Seong-Bin Yim, Jeff Willey, Joe Landa
    Multimedia authenticity protection with ICA watermarking and digital bacteria vaccination. [Citation Graph (0, 0)][DBLP]
    Neural Networks, 2003, v:16, n:5-6, pp:907-914 [Journal]

  12. k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks. [Citation Graph (, )][DBLP]


  13. A Graph-Theoretic Visualization Approach to Network Risk Analysis. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002