Year | Venue | Keywords |
---|---|---|
2008 | Fusion | computer crime,real-time systems,attack track projection,cyber security,hacker tradecraft,impact assessment architecture,information fusion techniques,intrusion detection systems,intrusion projection system,real-time continually learning system,VLMM,cyber fusion,intrusion projection |
Field | DocType | Citations |
Obsolescence,Software deployment,Systems science,Computer science,Computer security,Situation awareness,A priori and a posteriori,Network architecture,Hacker,Artificial intelligence,Intrusion detection system,Machine learning | Conference | 3 |
PageRank | References | Authors |
0.44 | 9 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Stephen R. Byers | 1 | 3 | 0.44 |
Shanchieh Jay Yang | 2 | 131 | 23.11 |