|
Search the dblp DataBase
Steven Noel:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Steven Noel, Sushil Jajodia
Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:160-169 [Conf]
- Steven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:86-95 [Conf]
- Steven Noel, Eric Robertson, Sushil Jajodia
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances. [Citation Graph (0, 0)][DBLP] ACSAC, 2004, pp:350-359 [Conf]
- Ronald W. Ritchey, Brian O'Berry, Steven Noel
Representing TCP/IP Connectivity For Topological Analysis of Network Security. [Citation Graph (0, 0)][DBLP] ACSAC, 2002, pp:25-34 [Conf]
- Steven Noel, Vijay V. Raghavan, Chee-Hung Henry Chu
Visualizing Association Mining Results through Hierarchical Clusters. [Citation Graph (0, 0)][DBLP] ICDM, 2001, pp:425-432 [Conf]
- Steven Noel, Chee-Hung Henry Chu, Vijay Raghavan
Visualization of Document Co-Citation Counts. [Citation Graph (0, 0)][DBLP] IV, 2002, pp:691-696 [Conf]
- Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia
Multiple Coordinated Views for Network Attack Graphs. [Citation Graph (0, 0)][DBLP] VizSEC, 2005, pp:12- [Conf]
- Steven Noel, Sushil Jajodia
Managing attack graph complexity through visual hierarchical aggregation. [Citation Graph (0, 0)][DBLP] VizSEC, 2004, pp:109-118 [Conf]
- Lingyu Wang, Steven Noel, Sushil Jajodia
Minimum-cost network hardening using attack graphs. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:18, pp:3812-3824 [Journal]
- Steven Noel, Chee-Hung Henry Chu, Vijay Raghavan
Co-Citation count vs correlation for influence network visualization. [Citation Graph (0, 0)][DBLP] Information Visualization, 2003, v:2, n:3, pp:160-170 [Journal]
- Harold Szu, Steven Noel, Seong-Bin Yim, Jeff Willey, Joe Landa
Multimedia authenticity protection with ICA watermarking and digital bacteria vaccination. [Citation Graph (0, 0)][DBLP] Neural Networks, 2003, v:16, n:5-6, pp:907-914 [Journal]
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks. [Citation Graph (, )][DBLP]
A Graph-Theoretic Visualization Approach to Network Risk Analysis. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|