Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets., , , , , , and . CSET, USENIX Association, (2009)Malicious Interfaces and Personalization's Uninviting Future., and . IEEE Security & Privacy, 7 (3): 64-67 (2009)Self-monitoring of web-based information disclosure., , and . WPES, page 56-59. ACM, (2007)Malicious interface design: exploiting the user., and . WWW, page 271-280. ACM, (2010)Towards a cyber common operating picture., , and . CyCon, page 1-17. IEEE, (2013)Key terrain in cyberspace: Seeking the high ground., , , and . CyCon, page 287-300. IEEE, (2014)Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries., , , and . VizSEC, page 10. IEEE Computer Society, (2005)Passive visual fingerprinting of network attack tools., and . VizSEC, page 45-54. ACM, (2004)Information Warfare in the Trenches., , and . World Conference on Information Security Education, volume 253 of IFIP Conference Proceedings, page 19-39. Kluwer, (2003)A Comprehensive Undergraduate Information Assurance Program., , , , and . World Conference on Information Security Education, volume 253 of IFIP Conference Proceedings, page 243-260. Kluwer, (2003)