Robert F. Erbacher

According to our database1, Robert F. Erbacher authored at least 70 papers between 1995 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Vision Transformer-based Real-Time Camouflaged Object Detection System at Edge.
Proceedings of the 2023 IEEE International Conference on Smart Computing, 2023

Flood-ResNet50: Optimized Deep Learning Model for Efficient Flood Detection on Edge Device.
Proceedings of the International Conference on Machine Learning and Applications, 2023

2022
CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations.
CoRR, 2022

Base-Rate Fallacy Redux and a Deep Dive Review in Cybersecurity.
CoRR, 2022

Secure Federated Training: Detecting Compromised Nodes and Identifying the Type of Attacks.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

2021
Supervised Authorship Segmentation of Open Source Code Projects.
Proc. Priv. Enhancing Technol., 2021

2019
MTD Techniques for Memory Protection Against Zero-Day Attacks.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

Learning From Experts' Experience: Toward Automated Cyber Security Data Triage.
IEEE Syst. J., 2019

2017
Studying Analysts' Data Triage Operations in Cyber Defense Situational Analysis.
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017

2016
A threat monitoring system in enterprise networks with smart mobiles.
Int. J. Secur. Networks, 2016

Demo: A Symbolic N-Variant System.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

Automate Cybersecurity Data Triage by Leveraging Human Analysts' Cognitive Process.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
Ontology-based Adaptive Systems of Cyber Defense.
Proceedings of the Tenth Conference on Semantic Technology for Intelligence, 2015

On simulation studies of jamming threats against LTE networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Network coding and coding-aware scheduling for multicast in wireless networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

ARSCA: a computer tool for tracing the cognitive processes of cyber-attack analysis.
Proceedings of the IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2015

2014
Cognitive Process.
Proceedings of the Cyber Defense and Situational Awareness, 2014

Concluding Thoughts.
Proceedings of the Cyber Defense and Situational Awareness, 2014

Preview.
Proceedings of the Cyber Defense and Situational Awareness, 2014

Recognizing Unexplained Behavior in Network Traffic.
Proceedings of the Network Science and Cybersecurity, 2014

Directed Multicut with linearly ordered terminals.
CoRR, 2014

Monitor placement for large-scale systems.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Toward Software Diversity in Heterogeneous Networked Systems.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

RankAOH: Context-driven similarity-based retrieval of experiences in cyber analysis.
Proceedings of the IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2014

Comparing Different Moving Target Defense Techniques.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

2013
Characterization and visualization of sophisticated scanning attacks.
Proceedings of IEEE International Conference on Communications, 2013

Encryption and Fragmentation for Data Confidentiality in the Cloud.
Proceedings of the Foundations of Security Analysis and Design VII, 2013

Using Security Policies to Automate Placement of Network Intrusion Prevention.
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013

Visualizing graph features for fast port scan detection.
Proceedings of the Cyber Security and Information Intelligence, 2013

Vulnerability analysis of a smart grid with monitoring and control system.
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
GULv3 - A Novel Tool for Network Managers to Audit Networks.
Int. J. Comput. Their Appl., 2012

Visualization design for immediate high-level situational assessment.
Proceedings of the 9th International Symposium on Visualization for Cyber Security, 2012

Design and Implementation of an Open Network and Host-Based Intrusion Detection Testbed with an Emphasis on Accuracy and Repeatability.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

Distributed Sensor Objects for Intrusion Detection Systems.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

Extending Case-Based Reasoning to Network Alert Reporting.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2011
A tri-linear visualization for network anomaly detection.
Proceedings of the Visualization and Data Analysis 2011, 2011

Preparing for the Next Wikileaks: Making Forensics Techniques Work.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

Web traffic profiling and characterization.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

A novel data reduction technique.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Combining Visualization and Interaction for Scalable Detection of Anomalies in Network Data.
J. Comput. Inf. Syst., 2010

A multi-phase network situational awareness cognitive task analysis.
Inf. Vis., 2010

Cognitive task analysis of network analysts and managers for network situational awareness.
Proceedings of the Visualization and Data Analysis, 2010

Validation for Digital Forensics.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

2009
OleDetection.
Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, 2009

Visualization for Rapid Assessment and Projection in Cyber Situational Awareness.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
The forensic validity of visual analytics.
Proceedings of the Visualization and Data Analysis 2008, 2008

SÁDI - Statistical Analysis for Data Type Identification.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

A Multi-Layered Approach to Botnet Detection.
Proceedings of the 2008 International Conference on Security & Management, 2008

Steps for Improving Data Comprehension for Digital Security and Forensics.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
Educating Students to Create Trustworthy Systems.
IEEE Secur. Priv., 2007

Identification and Localization of Data Types within Large-Scale File Systems.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007

Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007

Exemplifying the Inter-Disciplinary Nature of Visualization Research.
Proceedings of the 11th International Conference on Information Visualisation, 2007

2006
Visual Correlation of Network Alerts.
IEEE Computer Graphics and Applications, 2006

Improving the computer forensic analysis process through visualization.
Commun. ACM, 2006

2005
Designing Visualization Capabilities for IDS Challenges.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005

Extending command and control infrastructures to cyber warfare assets.
Proceedings of the IEEE International Conference on Systems, 2005

Real-Time Interactive Visual Port Monitoring and Analysis.
Proceedings of The 2005 International Conference on Security and Management, 2005

2004
Analysis and Management of Intrusion Data Collection.
Proceedings of the International Conference on Security and Management, 2004

2003
Computer Forensics Education.
IEEE Secur. Priv., 2003

Analysis and application of node layout algorithms for intrusion detection.
Proceedings of the Visualization and Data Analysis 2003, 2003

Intrusion behavior detection through visualization.
Proceedings of the IEEE International Conference on Systems, 2003

2002
Intrusion and Misuse Detection in Large-Scale Systems.
IEEE Computer Graphics and Applications, 2002

Glyph-based generic network visualization.
Proceedings of the Visualization and Data Analysis 2002, 2002

2001
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems.
Proceedings of the IASTED International Conference on Visualization, 2001

2000
Guest Editorial: Special Section on Visualization and Data Analysis.
J. Electronic Imaging, 2000

Visualization in Detection of Intrusions and Misuse in Large Scale Networks.
Proceedings of the International Conference on Information Visualisation, 2000

1995
Exploratory visualization research at the University of Massachusetts at Lowell.
Comput. Graph., 1995


  Loading...