Jeff Janies

According to our database1, Jeff Janies authored at least 10 papers between 2006 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Software asset analyzer: A system for detecting configuration anomalies.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2010
Cuckoo bags for exploring multikey data.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
An Adaptive Approach to Granular Real-Time Anomaly Detection.
EURASIP J. Adv. Signal Process., 2009

2008
Mutual information applied to anomaly detection.
J. Commun. Networks, 2008

Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis.
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008

2007
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks.
Int. J. Sens. Networks, 2007

Using uncleanliness to predict future botnet addresses.
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007

Fates: A Granular Approach to Real-Time Anomaly Detection.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

2006
On capturing and containing E-mail worms.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006


  Loading...