![]() |
| 2003 | ||
|---|---|---|
| 3 | James Butler, Jeffrey Undercoffer, John Pinkston: Hidden Processes: The Implication for Intrusion Detection. IAW 2003: 116-121 | |
| 2 | EE | Jeffrey Undercoffer, Anupam Joshi, John Pinkston: Modeling Computer Attacks: An Ontology for Intrusion Detection. RAID 2003: 113-135 |
| 1 | EE | Sasikanth Avancha, Jeffrey Undercoffer, Anupam Joshi, John Pinkston: Secure sensor networks for perimeter protection. Computer Networks 43(4): 421-435 (2003) |
| 1 | Sasikanth Avancha | [1] |
| 2 | James Butler | [3] |
| 3 | Anupam Joshi | [1] [2] |
| 4 | Jeffrey Undercoffer | [1] [2] [3] |