dblp.uni-trier.dewww.uni-trier.de

Jim Yuill

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2001
3 Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu, Jim Yuill: Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework. SEC 2001: 369-384
2000
2EEJim Yuill, Shyhtsun Felix Wu, J. Settle, Fengmin Gong, R. Forno, Ming-Yuh Huang, J. Asbery: Intrusion-detection for incident-response, using a military battlefield-intelligence process. Computer Networks 34(4): 671-697 (2000)
1999
1EEJim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Yuh Huang: Intrusion Detection for an On-Going Attack. Recent Advances in Intrusion Detection 1999

Coauthor Index

1J. Asbery [2]
2R. Forno [2]
3Fengmin Gong [1] [2]
4Ming-Yuh Huang [1] [2]
5Douglas S. Reeves [3]
6J. Settle [2]
7Xinyuan Wang [3]
8Shyhtsun Felix Wu [1] [2] [3]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)