Author: Robert F. Erbacher
Publication Overview
Publication period start: 1995
Number of co-authors: 15
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Teelink,
Sheldon,
Erbacher,
Robert F.
(2006):
Improving the computer forensic analysis process through visualization.
In
Communications of the ACM,
49
(2)
pp. 71-75.
https://dl.acm.org/doi/10.1145/1113034.1113073
Foresti,
Stefano,
Agutter,
James,
Livnat,
Yarden,
Moon,
Shaun,
Erbacher,
Robert F.
(2006):
Visual Correlation of Network Alerts.
In
IEEE Computer Graphics and Applications,
26
(2)
pp. 48-59.
https://doi.ieeecomputersociety.org/10.1109/MCG.2006.49
Erbacher,
Robert F.,
Walker,
Kenneth L.,
Frincke,
Deborah A.
(2002):
Intrusion and Misuse Detection in Large-Scale Systems.
In
IEEE Computer Graphics and Applications,
22
(1)
pp. 38-48.
https://csdl.computer.org/comp/mags/cg/2002/01/g1038abs.htm
Erbacher,
Robert F.,
Grinstein,
Georges G.,
Lee,
John Peter,
Levkowitz,
Haim,
Masterman,
Lisa,
Pickett,
Ron,
Smith,
Stuart
(1995):
Exploratory visualization research at the University of Massachusetts at Lowell.
In
Computers & Graphics,
19
(1)
pp. 131-139.
https://dx.doi.org/10.1016/0097-8493(94)00128-L
Erbacher,
Robert F.,
Christensen,
Kim,
Sundberg,
Amanda
(2005):
Designing Visualization Capabilities for IDS Challenges.
In:
Ma,
Kwan-Liu,
North,
Stephen C.,
Yurcik,
William
(eds.)
VizSEC 2005 - IEEE Workshop on Visualization for Computer Security
26 October,
2005,
Minneapolis, MN, USA.
pp. 15.
https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.5
Erbacher,
Robert F.,
Frincke,
Deborah A.
(2000):
Visualization in Detection of Intrusions and Misuse in Large Scale Networks.
In:
IV 2000
,
2000,
.
pp. 294-.
https://csdl.computer.org/comp/proceedings/iv/2000/0743/00/07430294abs.htm
Erbacher,
Robert F.
(2007):
Exemplifying the Inter-Disciplinary Nature of Visualization Research.
In:
IV 2007 - 11th International Conference on Information Visualisation
2-6 July,
2007,
Zürich, Switzerland.
pp. 623-630.
https://doi.ieeecomputersociety.org/10.1109/IV.2007.49