2004 |
5 | EE | Filip Perich,
Jeffrey Undercoffer,
Lalana Kagal,
Anupam Joshi,
Timothy W. Finin,
Yelena Yesha:
In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks.
MobiQuitous 2004: 326-334 |
2003 |
4 | | James Butler,
Jeffrey Undercoffer,
John Pinkston:
Hidden Processes: The Implication for Intrusion Detection.
IAW 2003: 116-121 |
3 | EE | Jeffrey Undercoffer,
Anupam Joshi,
John Pinkston:
Modeling Computer Attacks: An Ontology for Intrusion Detection.
RAID 2003: 113-135 |
2 | EE | Sasikanth Avancha,
Jeffrey Undercoffer,
Anupam Joshi,
John Pinkston:
Secure sensor networks for perimeter protection.
Computer Networks 43(4): 421-435 (2003) |
1 | | Jeffrey Undercoffer,
Filip Perich,
Andrej Cedilnik,
Lalana Kagal,
Anupam Joshi:
A Secure Infrastructure for Service Discovery and Access in Pervasive Computing.
MONET 8(2): 113-125 (2003) |