Rebecca Cathey

According to our database1, Rebecca Cathey authored at least 15 papers between 2003 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Re-thinking Online Offenders' SKRAM: Individual Traits and Situational Motivations as Additional Risk Factors for Predicting Cyber Attacks.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

On the relevance of social media platforms in predicting the volume and patterns of web defacement attacks.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Detection of hacking behaviors and communication patterns on social media.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2013
Automated Execution Control and Dynamic Behavior Monitoring for Android (TM) Applications.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Behavior Analysis via Execution Path Clusters.
Proceedings of the 32th IEEE Military Communications Conference, 2013

2009
Worldwide Accessibility to Yizkor Books.
Proceedings of the Next Generation Information Technologies and Systems, 2009

Optimal content delivery with network coding.
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009

2008
Using a relational database for scalable XML search.
J. Supercomput., 2008

Yizkor books: a voice for the silent past.
Proceedings of the 17th ACM Conference on Information and Knowledge Management, 2008

2007
Exploiting parallelism to support scalable hierarchical clustering.
J. Assoc. Inf. Sci. Technol., 2007

Relationally Mapping XML Queries For Scalable XML Search.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

2004
Measuring the Scalability of Relationally Mapped Semistructured Queries.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

2003
IIT at TREC 2003, Task Classification and Document Structrure for Known-Item Search.
Proceedings of The Twelfth Text REtrieval Conference, 2003

Misuse Detection for Information Retrieval Systems: A Preliminary Approach.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003

Misuse detection for information retrieval systems.
Proceedings of the 2003 ACM CIKM International Conference on Information and Knowledge Management, 2003


  Loading...