The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Robert K. Cunningham: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Allen M. Waxman, Michael Seibert, Robert K. Cunningham, Jian Wu
    Neural Analog Diffusion-Enhancement Layer and Spatio-Temporal Grouping in Early Vision. [Citation Graph (0, 0)][DBLP]
    NIPS, 1988, pp:289-296 [Conf]
  2. Jeffrey Bonar, Robert K. Cunningham, Jamie Schultz
    An Object-Oriented Architecture for Intelligent Tutoring Systems. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 1986, pp:269-276 [Conf]
  3. Robert K. Cunningham, Craig S. Stevenson
    Accurately Detecting Source Code of Attacks That Increase Privilege. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:104-116 [Conf]
  4. Richard Lippmann, Robert K. Cunningham
    Improving Intrusion Detection Performance using Keyword Selection and Neural Networks. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  5. Richard Lippmann, Robert K. Cunningham, David J. Fried, Isaac Graf, Kris R. Kendall, Seth E. Webster, Marc A. Zissman
    Results of the DARPA 1998 Offline Intrusion Detection Evaluation. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  6. Richard Lippmann, Robert K. Cunningham
    Improving intrusion detection performance using keyword selection and neural networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:34, n:4, pp:597-603 [Journal]
  7. Robert K. Cunningham, Allen M. Waxman
    Diffusion-enhancement bilayer: Realizing long-range apparent motion and spatiotemporal grouping in a neural architecture. [Citation Graph (0, 0)][DBLP]
    Neural Networks, 1994, v:7, n:6-7, pp:895-924 [Journal]
  8. Allen M. Waxman, Michael Seibert, Alan N. Gove, David A. Fay, Ann Marie Bernardon, Carol Lazott, William R. Steele, Robert K. Cunningham
    Neural processing of targets in visible, multispectral IR and SAR imagery. [Citation Graph (0, 0)][DBLP]
    Neural Networks, 1995, v:8, n:7-8, pp:1029-1051 [Journal]
  9. Robert K. Cunningham, Richard Lippmann, Seth E. Webster
    Detecting and displaying novel computer attacks with Macroscope. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2001, v:31, n:4, pp:275-281 [Journal]

  10. Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security. [Citation Graph (, )][DBLP]


  11. Integrated Environment Management for Information Operations Testbeds. [Citation Graph (, )][DBLP]


  12. Detection of injected, dynamically generated, and obfuscated malicious code. [Citation Graph (, )][DBLP]


  13. Securing Current and Future Process Control Systems. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002