Jim Yuill

According to our database1, Jim Yuill authored at least 4 papers between 1999 and 2001.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2001
Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

2000
Intrusion-detection for incident-response, using a military battlefield-intelligence process.
Comput. Networks, 2000

1999
Intrusion Detection for an On-Going Attack.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999

DecIdUouS: Decentralized Source Identification for Network-Based Intrusions.
Proceedings of the 1999 IEEE/IFIP International Symposium on Integrated Network Management, 1999


  Loading...