John Hurley

According to our database1, John Hurley authored at least 10 papers between 2002 and 2012.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
ITACA: Flexible, scalable network analysis.
Proceedings of IEEE International Conference on Communications, 2012

2011
Host-Based P2P Flow Identification and Use in Real-Time.
ACM Trans. Web, 2011

Classifying network protocols: A 'two-way' flow approach.
IET Commun., 2011

2010
LESR CLASS: an LCS for securities trading rulesets.
Proceedings of the Genetic and Evolutionary Computation Conference, 2010

2009
Classification of P2P and HTTP Using Specific Protocol Characteristics.
Proceedings of the Internet of the Future, 2009

Identification of P2P flows through host activity.
Proceedings of the 6th International ICST Conference on Broadband Communications, 2009

2007
Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers.
Appl. Soft Comput., 2007

2004
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers.
Proceedings of the Genetic and Evolutionary Computation, 2004

Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm red teams.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

2002
Security on Macintosh OS X.
Proceedings of the 16th Conference on Systems Administration (LISA 2002), 2002


  Loading...