2005 |
9 | EE | John C. McEachen,
John Zachary:
A Novel Approach to Accentuating Anomalous Events in Complex Network Systems.
HICSS 2005 |
8 | EE | John C. McEachen,
John Zachary:
Real-Time Representation of Network Traffic Behavior for Enhanced Security.
ICITA (2) 2005: 214-219 |
2004 |
7 | EE | Sudhamsu Mylavarapu,
John C. McEachen,
John Zachary,
Stefan L. Walch,
John S. Marinovich:
Modeling Traffic Flow Using Conversation Exchange Dynamics for Identifying Network Attacks.
ECUMN 2004: 317-326 |
6 | | John C. McEachen,
John Zachary,
Daniel W. Ettlich:
Differentiating network conversation flow for intrusion detection and diagnostics.
ISCAS (4) 2004: 473-476 |
5 | EE | John Zachary,
John C. McEachen,
Daniel W. Ettlich:
Conversation Exchange Dynamics for Real-Time Network Monitoring and Anomaly Detection.
IWIA 2004: 59-70 |
2003 |
4 | EE | John Zachary:
Protecting Mobile Code in the Wild.
IEEE Internet Computing 7(2): 78-82 (2003) |
3 | | John Zachary,
Richard R. Brooks:
Bidirectional Mobile Code Trust Management Using Tamper Resistant Hardware.
MONET 8(2): 137-143 (2003) |
2001 |
2 | | John Zachary,
S. Sitharama Iyengar,
Jacob Barhen:
Content based image retrieval and information theory: A general approach.
JASIST 52(10): 840-852 (2001) |
1 | | John Zachary,
S. Sitharama Iyengar:
Information theoretic similarity measures for content based image retrieval.
JASIST 52(10): 856-867 (2001) |