![]() |
| 2003 | ||
|---|---|---|
| 2 | EE | Cristina Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, Kenneth E. Rowe: Log Correlation for Intrusion Detection: A Proof of Concept. ACSAC 2003: 255-265 |
| 1995 | ||
| 1 | EE | Kenneth E. Rowe, Charles K. Nicholas: Reliability of WWW Name Servers. Computer Networks and ISDN Systems 27(6): 773-780 (1995) |
| 1 | Cristina Abad | [2] |
| 2 | Charles K. Nicholas | [1] |
| 3 | Cigdem Sengul | [2] |
| 4 | Jed Taylor | [2] |
| 5 | William Yurcik | [2] |
| 6 | Yuanyuan Zhou | [2] |