Steven Noel
Orcid: 0000-0002-8540-0702
  According to our database1,
  Steven Noel
  authored at least 32 papers
  between 1997 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
Synthesizing Diverse Network Flow Datasets with Scalable Dynamic Multigraph Generation.
    
  
    CoRR, May, 2025
    
  
Detecting Anomalous Communication Behaviors in Dynamically Evolving Networked Systems.
    
  
    IEEE Trans. Inf. Forensics Secur., 2025
    
  
  2024
    Proceedings of the IEEE International Systems Conference, 2024
    
  
  2022
    Proceedings of the Information and Communications Security - 24th International Conference, 2022
    
  
  2018
Approaches to Enhancing Cyber Resilience: Report of the North Atlantic Treaty Organization (NATO) Workshop IST-153.
    
  
    CoRR, 2018
    
  
    Proceedings of the 10th International Conference on Cyber Conflict, 2018
    
  
    Proceedings of the From Database to Cyber Security, 2018
    
  
  2014
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities.
    
  
    IEEE Trans. Dependable Secur. Comput., 2014
    
  
    Proceedings of the Cyber and Information Security Research Conference, 2014
    
  
  2012
    Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
    
  
  2011
    Proceedings of the MILCOM 2011, 2011
    
  
  2010
    Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
    
  
    Int. J. Next Gener. Comput., 2010
    
  
<i>k</i>-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks.
    
  
    Proceedings of the Computer Security, 2010
    
  
  2008
    J. Netw. Syst. Manag., 2008
    
  
    Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008
    
  
  2006
  2005
    Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005
    
  
    Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
    
  
  2004
    Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004
    
  
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances.
    
  
    Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
    
  
  2003
Multimedia authenticity protection with ICA watermarking and digital bacteria vaccination.
    
  
    Neural Networks, 2003
    
  
    Inf. Vis., 2003
    
  
Protecting multimedia authenticity with ICA vaccination of digital bacteria watermarks.
    
  
    Proceedings of the International Joint Conference on Neural Networks, 2003
    
  
    Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
    
  
Document Clustering, Visualization, and Retrieval Link Mining.
  
    Proceedings of the Clustering and Information Retrieval, 2003
    
  
  2002
    Proceedings of the International Conference on Information Visualisation, 2002
    
  
    Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
    
  
    Proceedings of the Applications of Data Mining in Computer Security, 2002
    
  
  2001
    Proceedings of the 2001 IEEE International Conference on Data Mining, 29 November, 2001
    
  
  1998
  1997
Multiple-resolution divide and conquer neural networks for large-scale TSP-like energy minimization problems.
    
  
    Proceedings of International Conference on Neural Networks (ICNN'97), 1997