default search action
BibTeX records: Eric Ficke
@article{DBLP:journals/jpdc/HeFPCTCPNX22, author = {Songlin He and Eric Ficke and Mir Mehedi Ahsan Pritom and Huashan Chen and Qiang Tang and Qian Chen and Marcus Pendleton and Laurent Njilla and Shouhuai Xu}, title = {Blockchain-based automated and robust cyber security management}, journal = {J. Parallel Distributed Comput.}, volume = {163}, pages = {62--82}, year = {2022}, url = {https://doi.org/10.1016/j.jpdc.2022.01.002}, doi = {10.1016/J.JPDC.2022.01.002}, timestamp = {Fri, 28 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/HeFPCTCPNX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/FickeBX22, author = {Eric Ficke and Raymond M. Bateman and Shouhuai Xu}, editor = {Xingliang Yuan and Guangdong Bai and Cristina Alcaraz and Suryadipta Majumdar}, title = {Reducing Intrusion Alert Trees to Aid Visualization}, booktitle = {Network and System Security - 16th International Conference, {NSS} 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13787}, pages = {140--154}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23020-2\_8}, doi = {10.1007/978-3-031-23020-2\_8}, timestamp = {Sun, 04 Aug 2024 19:43:03 +0200}, biburl = {https://dblp.org/rec/conf/nss/FickeBX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/FickeX20, author = {Eric Ficke and Shouhuai Xu}, title = {{APIN:} Automatic Attack Path Identification in Computer Networks}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2020, Arlington, VA, USA, November 9-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISI49825.2020.9280547}, doi = {10.1109/ISI49825.2020.9280547}, timestamp = {Mon, 14 Dec 2020 11:14:41 +0100}, biburl = {https://dblp.org/rec/conf/isi/FickeX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MirelesFCHX19, author = {Jose David Mireles and Eric Ficke and Jin{-}Hee Cho and Patrick M. Hurley and Shouhuai Xu}, title = {Metrics Towards Measuring Cyber Agility}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {12}, pages = {3217--3232}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2019.2912551}, doi = {10.1109/TIFS.2019.2912551}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MirelesFCHX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/FickeSBX19, author = {Eric Ficke and Kristin M. Schweitzer and Raymond M. Bateman and Shouhuai Xu}, title = {Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study}, booktitle = {2019 {IEEE} Military Communications Conference, {MILCOM} 2019, Norfolk, VA, USA, November 12-14, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/MILCOM47813.2019.9020860}, doi = {10.1109/MILCOM47813.2019.9020860}, timestamp = {Thu, 19 Mar 2020 08:47:16 +0100}, biburl = {https://dblp.org/rec/conf/milcom/FickeSBX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-05395, author = {Jose David Mireles and Eric Ficke and Jin{-}Hee Cho and Patrick M. Hurley and Shouhuai Xu}, title = {Metrics Towards Measuring Cyber Agility}, journal = {CoRR}, volume = {abs/1906.05395}, year = {2019}, url = {http://arxiv.org/abs/1906.05395}, eprinttype = {arXiv}, eprint = {1906.05395}, timestamp = {Mon, 24 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-05395.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-08725, author = {Eric Ficke and Kristin M. Schweitzer and Raymond M. Bateman and Shouhuai Xu}, title = {Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study}, journal = {CoRR}, volume = {abs/1909.08725}, year = {2019}, url = {http://arxiv.org/abs/1909.08725}, eprinttype = {arXiv}, eprint = {1909.08725}, timestamp = {Tue, 24 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-08725.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/FickeSBX18, author = {Eric Ficke and Kristin M. Schweitzer and Raymond M. Bateman and Shouhuai Xu}, title = {Characterizing the Effectiveness of Network-Based Intrusion Detection Systems}, booktitle = {2018 {IEEE} Military Communications Conference, {MILCOM} 2018, Los Angeles, CA, USA, October 29-31, 2018}, pages = {76--81}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MILCOM.2018.8599700}, doi = {10.1109/MILCOM.2018.8599700}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/FickeSBX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.