2003 | ||
---|---|---|
3 | James Butler, Jeffrey Undercoffer, John Pinkston: Hidden Processes: The Implication for Intrusion Detection. IAW 2003: 116-121 | |
2 | EE | Jeffrey Undercoffer, Anupam Joshi, John Pinkston: Modeling Computer Attacks: An Ontology for Intrusion Detection. RAID 2003: 113-135 |
1 | EE | Sasikanth Avancha, Jeffrey Undercoffer, Anupam Joshi, John Pinkston: Secure sensor networks for perimeter protection. Computer Networks 43(4): 421-435 (2003) |
1 | Sasikanth Avancha | [1] |
2 | James Butler | [3] |
3 | Anupam Joshi | [1] [2] |
4 | Jeffrey Undercoffer | [1] [2] [3] |