The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stefan Axelsson: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stefan Axelsson
    The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:1-7 [Conf]
  2. Stefan Axelsson
    Visualisation for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:309-325 [Conf]
  3. Johan Stahre, A. Johansson, Stefan Axelsson
    Joint Optimization of People and Technology-An Example from the Car Industry. [Citation Graph (0, 0)][DBLP]
    HCI (1), 1997, pp:265-268 [Conf]
  4. Stefan Axelsson
    On a Difficulty of Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  5. Stefan Axelsson
    Visualising Intrusions: Watching the Webserver. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:259-274 [Conf]
  6. Stefan Axelsson
    Combining a bayesian classifier with visualisation: understanding the IDS. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2004, pp:99-108 [Conf]
  7. Stefan Axelsson
    The base-rate fallacy and the difficulty of intrusion detection. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2000, v:3, n:3, pp:186-205 [Journal]

  8. Using Normalized Compression Distance for Classifying File Fragments. [Citation Graph (, )][DBLP]


  9. Detecting Defects with an Interactive Code Review Tool Based on Visualisation and Machine Learning. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002