Name
Affiliation
Papers
ROBERT F. ERBACHER
Utah State Univ, Dept Comp Sci, Logan, UT 84322 USA
40
Collaborators
Citations 
PageRank 
66
202
27.65
Referers 
Referees 
References 
524
546
242
Search Limit
100546
Title
Citations
PageRank
Year
Learning From Experts’ Experience: Toward Automated Cyber Security Data Triage10.362019
A threat monitoring system in enterprise networks with smart mobiles00.342016
Demo: A Symbolic N-Variant System.00.342016
Automate Cybersecurity Data Triage by Leveraging Human Analysts' Cognitive Process30.392016
On simulation studies of jamming threats against LTE networks10.342015
Ontology-based Adaptive Systems of Cyber Defense.00.342015
Directed Multicut with linearly ordered terminals.10.362014
RankAOH: Context-driven similarity-based retrieval of experiences in cyber analysis40.492014
Comparing Different Moving Target Defense Techniques201.462014
Monitor placement for large-scale systems30.392014
Using security policies to automate placement of network intrusion prevention40.422013
Visualizing graph features for fast port scan detection00.342013
Vulnerability analysis of a smart grid with monitoring and control system00.342013
Visualization design for immediate high-level situational assessment.100.612012
GULv3 - A Novel Tool for Network Managers to Audit Networks.00.342012
Distributed Sensor Objects for Intrusion Detection Systems10.382012
Extending Case-Based Reasoning to Network Alert Reporting40.522012
Design and Implementation of an Open Network and Host-Based Intrusion Detection Testbed with an Emphasis on Accuracy and Repeatability00.342012
A Tri-Linear Visualization For Network Anomaly Detection10.372011
Preparing for the Next Wikileaks: Making Forensics Techniques Work00.342011
Cognitive Task Analysis Of Network Analysts And Managers For Network Situational Awareness50.462010
A multi-phase network situational awareness cognitive task analysis151.042010
Validation for Digital Forensics10.362010
Combining Visualization and Interaction for Scalable Detection of Anomalies in Network Data.00.342010
OleDetection00.342009
Visualization for Rapid Assessment and Projection in Cyber Situational Awareness00.342009
Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model30.472008
SÁDI - Statistical Analysis for Data Type Identification221.742008
Identification and Localization of Data Types within Large-Scale File Systems181.532007
Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution10.422007
Improving the computer forensic analysis process through visualization221.632006
Designing Visualization Capabilities for IDS Challenges120.772005
Real-Time Interactive Visual Port Monitoring and Analysis00.342005
Analysis and Management of Intrusion Data Collection00.342004
Analysis And Application Of Node Layout Algorithms For Intrusion Detection10.392003
Computer Forensics Education343.862003
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems20.612001
Guest Editorial: Special Section on Visualization and Data Analysis00.342000
Visualization in Detection of Intrusions and Misuse in Large Scale Networks112.422000
Exploratory visualization research at the University of Massachusetts at Lowell21.111995