Остановите войну!
for scientists:
default search action
Robert F. Erbacher
- > Home > Persons > Robert F. Erbacher
Publications
- 2021
- [j13]Edwin Dauber, Robert F. Erbacher, Gregory Shearer, Michael J. Weisman, Frederica Free-Nelson, Rachel Greenstadt:
Supervised Authorship Segmentation of Open Source Code Projects. Proc. Priv. Enhancing Technol. 2021(4): 464-479 (2021) - 2019
- [j12]Chen Zhong, John Yen, Peng Liu, Robert F. Erbacher:
Learning From Experts' Experience: Toward Automated Cyber Security Data Triage. IEEE Syst. J. 13(1): 603-614 (2019) - [p6]Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Rob Erbacher, Sushil Jajodia, Peng Liu:
MTD Techniques for Memory Protection Against Zero-Day Attacks. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 129-155 - 2017
- [p5]Chen Zhong, John Yen, Peng Liu, Robert F. Erbacher, Christopher Garneau, Bo Chen:
Studying Analysts' Data Triage Operations in Cyber Defense Situational Analysis. Theory and Models for Cyber Situation Awareness 2017: 128-169 - 2016
- [j11]Zhijiang Chen, Linqiang Ge, Guobin Xu, Wei Yu, Robert F. Erbacher, Hasan Cam, Nnanna Ekedebe:
A threat monitoring system in enterprise networks with smart mobiles. Int. J. Secur. Networks 11(1/2): 66-81 (2016) - [c45]Chen Zhong, John Yen, Peng Liu, Robert F. Erbacher:
Automate Cybersecurity Data Triage by Leveraging Human Analysts' Cognitive Process. BigDataSecurity/HPSC/IDS 2016: 357-363 - [c44]Jun Xu, Pinyao Guo, Bo Chen, Robert F. Erbacher, Ping Chen, Peng Liu:
Demo: A Symbolic N-Variant System. MTD@CCS 2016: 65-68 - 2015
- [c43]Chen Zhong, John Yen, Peng Liu, Rob Erbacher, Renee Etoty, Christopher Garneau:
ARSCA: a computer tool for tracing the cognitive processes of cyber-attack analysis. CogSIMA 2015: 165-171 - [c42]Chen Zhong, John Yen, Peng Liu, Rob Erbacher, Renee Etoty, Christopher Garneau:
An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes. HotSoS 2015: 9:1-9:11 - [c40]Sulabh Bhattarai, Sixiao Wei, Stephen Rook, Wei Yu, Robert F. Erbacher, Hasan Cam:
On simulation studies of jamming threats against LTE networks. ICNC 2015: 99-103 - [c39]Noam Ben-Asher, Alessandro Oltramari, Robert F. Erbacher, Cleotilde Gonzalez:
Ontology-based Adaptive Systems of Cyber Defense. STIDS 2015: 34-41 - 2014
- [c38]Jun Xu, Pinyao Guo, Mingyi Zhao, Robert F. Erbacher, Minghui Zhu, Peng Liu:
Comparing Different Moving Target Defense Techniques. MTD@CCS 2014: 97-107 - [c37]Chen Zhong, Deepak Samuel, John Yen, Peng Liu, Robert F. Erbacher, Steve E. Hutchinson, Renee Etoty, Hasan Cam, William Glodek:
RankAOH: Context-driven similarity-based retrieval of experiences in cyber analysis. CogSIMA 2014: 230-236 - [c36]Chu Huang, Sencun Zhu, Robert F. Erbacher:
Toward Software Diversity in Heterogeneous Networked Systems. DBSec 2014: 114-129 - [c35]Nirupama Talele, Jason Teutsch, Robert F. Erbacher, Trent Jaeger:
Monitor placement for large-scale systems. SACMAT 2014: 29-40 - [p4]Alexander Kott, Cliff Wang, Robert F. Erbacher:
Preview. Cyber Defense and Situational Awareness 2014: 1-5 - [p3]Massimiliano Albanese, Robert F. Erbacher, Sushil Jajodia, Cristian Molinaro, Fabio Persia, Antonio Picariello, Giancarlo Sperlì, V. S. Subrahmanian:
Recognizing Unexplained Behavior in Network Traffic. Network Science and Cybersecurity 2014: 39-62 - [p2]John Yen, Robert F. Erbacher, Chen Zhong, Peng Liu:
Cognitive Process. Cyber Defense and Situational Awareness 2014: 119-144 - [p1]Alexander Kott, Cliff Wang, Robert F. Erbacher:
Concluding Thoughts. Cyber Defense and Situational Awareness 2014: 323-328 - [e9]Alexander Kott, Cliff Wang, Robert F. Erbacher:
Cyber Defense and Situational Awareness. Advances in Information Security 62, Springer 2014, ISBN 978-3-319-11390-6 [contents] - [i1]Robert F. Erbacher, Trent Jaeger, Nirupama Talele, Jason Teutsch:
Directed Multicut with linearly ordered terminals. CoRR abs/1407.7498 (2014) - 2013
- [c32]Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher:
Using Security Policies to Automate Placement of Network Intrusion Prevention. ESSoS 2013: 17-32 - [c31]Sabrina De Capitani di Vimercati, Robert F. Erbacher, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Pierangela Samarati:
Encryption and Fragmentation for Data Confidentiality in the Cloud. FOSAD 2013: 212-243 - 2012
- [c29]Robert F. Erbacher, Steve E. Hutchinson:
Extending Case-Based Reasoning to Network Alert Reporting. CyberSecurity 2012: 187-194 - [c28]Michael J. Shevenell, Robert F. Erbacher:
Design and Implementation of an Open Network and Host-Based Intrusion Detection Testbed with an Emphasis on Accuracy and Repeatability. ITNG 2012: 409-416 - [c27]Robert F. Erbacher, Steve E. Hutchinson:
Distributed Sensor Objects for Intrusion Detection Systems. ITNG 2012: 417-424 - 2011
- [c24]Robert F. Erbacher, Steve E. Hutchinson, Joshua Edwards:
Web traffic profiling and characterization. CSIIRW 2011: 71 - [e8]Robert F. Erbacher, Roy H. Campbell, Yong Guan:
2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2011, Oakland, CA, USA, May 26, 2011. IEEE Computer Society 2011, ISBN 978-1-4673-1242-4 [contents] - 2003
- [j4]Alec Yasinsac, Robert F. Erbacher, Donald G. Marks, Mark Pollitt, Peter M. Sommer:
Computer Forensics Education. IEEE Secur. Priv. 1(4): 15-23 (2003)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-09 00:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint