Steven Noel

Orcid: 0000-0002-8540-0702

According to our database1, Steven Noel authored at least 29 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Anomalous Link Detection in Dynamically Evolving Scale-Free-Like Networked Systems.
Proceedings of the IEEE International Systems Conference, 2024

2022
Dependency-Based Link Prediction for Learning Microsegmentation Policy.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

2018
Approaches to Enhancing Cyber Resilience: Report of the North Atlantic Treaty Organization (NATO) Workshop IST-153.
CoRR, 2018

Mission-focused cyber situational understanding via graph analytics.
Proceedings of the 10th International Conference on Cyber Conflict, 2018

A Review of Graph Approaches to Network Security Analytics.
Proceedings of the From Database to Cyber Security, 2018

2014
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities.
IEEE Trans. Dependable Secur. Comput., 2014

Metrics suite for network attack graph analytics.
Proceedings of the Cyber and Information Security Research Conference, 2014

2012
Time-efficient and cost-effective network hardening using attack graphs.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

2011
Cauldron mission-centric cyber situational awareness with defense in depth.
Proceedings of the MILCOM 2011, 2011

2010
Topological Vulnerability Analysis.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Measuring Security Risk of Networks Using Attack Graphs.
Int. J. Next Gener. Comput., 2010

<i>k</i>-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks.
Proceedings of the Computer Security, 2010

2008
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs.
J. Netw. Syst. Manag., 2008

A Graph-Theoretic Visualization Approach to Network Risk Analysis.
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008

2006
Minimum-cost network hardening using attack graphs.
Comput. Commun., 2006

2005
Multiple Coordinated Views for Network Attack Graphs.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005

Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Managing attack graph complexity through visual hierarchical aggregation.
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004

Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Multimedia authenticity protection with ICA watermarking and digital bacteria vaccination.
Neural Networks, 2003

Co-Citation count vs correlation for influence network visualization.
Inf. Vis., 2003

Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

Document Clustering, Visualization, and Retrieval Link Mining.
Proceedings of the Clustering and Information Retrieval, 2003

2002
Visualization of Document Co-Citation Counts.
Proceedings of the International Conference on Information Visualisation, 2002

Representing TCP/IP Connectivity For Topological Analysis of Network Security.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt.
Proceedings of the Applications of Data Mining in Computer Security, 2002

2001
Visualizing Association Mining Results through Hierarchical Clusters.
Proceedings of the 2001 IEEE International Conference on Data Mining, 29 November, 2001

1998
Proximity sensing with wavelet-generated video.
J. Electronic Imaging, 1998

1997
Multiple-resolution divide and conquer neural networks for large-scale TSP-like energy minimization problems.
Proceedings of International Conference on Neural Networks (ICNN'97), 1997


  Loading...