John Pinkston - Publications
Affiliations: | University of Maryland, Baltimore County, Baltimore, MD, United States |
Area:
Computer ScienceYear | Citation | Score | |||
---|---|---|---|---|---|
2004 | Avancha S, Undercoffer J, Joshi A, Pinkston J. Security for wireless sensor networks Wireless Sensor Network. 253-275. DOI: 10.1007/978-1-4020-7884-2_12 | 0.65 | |||
2004 | Parker J, Undercoffer J, Pinkston J, Joshi A. On intrusion detection and response for mobile ad hoc networks Ieee International Performance, Computing and Communications Conference, Proceedings. 23: 747-752. | 0.336 | |||
2003 | Butler J, Undercoffer JL, Pinkston J. Hidden processes: The implication for intrusion detection Ieee Systems, Man and Cybernetics Society Information Assurance Workshop. 116-121. DOI: 10.1109/SMCSIA.2003.1232409 | 0.624 | |||
2003 | Undercoffer J, Joshi A, Finin T, Pinkston J. Using DAML + OIL to classify intrusive behaviours Knowledge Engineering Review. 18: 221-241. DOI: 10.1017/S0269888904000049 | 0.619 | |||
2003 | Avancha S, Undercoffer J, Joshi A, Pinkston J. Secure sensor networks for perimeter protection Computer Networks. 43: 421-435. DOI: 10.1016/S1389-1286(03)00352-9 | 0.656 | |||
2003 | Undercoffer J, Joshi A, Pinkston J. Modeling computer attacks: An ontology for intrusion detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2820: 113-135. | 0.305 | |||
Show low-probability matches. |