default search action
Robert F. Erbacher
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c48]Md. Azim Khan, Nadeem Ahmed, Joyce Padela, Muhammad Shehrose Raza, Aryya Gangopadhyay, Jianwu Wang, James Foulds, Carl E. Busart, Robert F. Erbacher:
Flood-ResNet50: Optimized Deep Learning Model for Efficient Flood Detection on Edge Device. ICMLA 2023: 512-519 - [c47]Rohan Putatunda, Azim Khan, Aryya Gangopadhyay, Jianwu Wang, Carl E. Busart, Robert F. Erbacher:
Vision Transformer-based Real-Time Camouflaged Object Detection System at Edge. SMARTCOMP 2023: 90-97 - 2022
- [c46]Pretom Roy Ovi, Aryya Gangopadhyay, Robert F. Erbacher, Carl E. Busart:
Secure Federated Training: Detecting Compromised Nodes and Identifying the Type of Attacks. ICMLA 2022: 1115-1120 - [i3]Robert F. Erbacher:
Base-Rate Fallacy Redux and a Deep Dive Review in Cybersecurity. CoRR abs/2203.08801 (2022) - [i2]Sai Sree Laya Chukkapalli, Anupam Joshi, Tim Finin, Robert F. Erbacher:
CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations. CoRR abs/2208.01703 (2022) - 2021
- [j13]Edwin Dauber, Robert F. Erbacher, Gregory Shearer, Michael J. Weisman, Frederica Free-Nelson, Rachel Greenstadt:
Supervised Authorship Segmentation of Open Source Code Projects. Proc. Priv. Enhancing Technol. 2021(4): 464-479 (2021)
2010 – 2019
- 2019
- [j12]Chen Zhong, John Yen, Peng Liu, Robert F. Erbacher:
Learning From Experts' Experience: Toward Automated Cyber Security Data Triage. IEEE Syst. J. 13(1): 603-614 (2019) - [p6]Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Rob Erbacher, Sushil Jajodia, Peng Liu:
MTD Techniques for Memory Protection Against Zero-Day Attacks. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 129-155 - 2017
- [p5]Chen Zhong, John Yen, Peng Liu, Robert F. Erbacher, Christopher Garneau, Bo Chen:
Studying Analysts' Data Triage Operations in Cyber Defense Situational Analysis. Theory and Models for Cyber Situation Awareness 2017: 128-169 - 2016
- [j11]Zhijiang Chen, Linqiang Ge, Guobin Xu, Wei Yu, Robert F. Erbacher, Hasan Cam, Nnanna Ekedebe:
A threat monitoring system in enterprise networks with smart mobiles. Int. J. Secur. Networks 11(1/2): 66-81 (2016) - [c45]Chen Zhong, John Yen, Peng Liu, Robert F. Erbacher:
Automate Cybersecurity Data Triage by Leveraging Human Analysts' Cognitive Process. BigDataSecurity/HPSC/IDS 2016: 357-363 - [c44]Jun Xu, Pinyao Guo, Bo Chen, Robert F. Erbacher, Ping Chen, Peng Liu:
Demo: A Symbolic N-Variant System. MTD@CCS 2016: 65-68 - 2015
- [c43]Chen Zhong, John Yen, Peng Liu, Rob Erbacher, Renee Etoty, Christopher Garneau:
ARSCA: a computer tool for tracing the cognitive processes of cyber-attack analysis. CogSIMA 2015: 165-171 - [c42]Chen Zhong, John Yen, Peng Liu, Rob Erbacher, Renee Etoty, Christopher Garneau:
An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes. HotSoS 2015: 9:1-9:11 - [c41]Maggie X. Cheng, Quanmin Ye, Xiaochun Cheng, Robert F. Erbacher:
Network coding and coding-aware scheduling for multicast in wireless networks. ICC 2015: 5703-5708 - [c40]Sulabh Bhattarai, Sixiao Wei, Stephen Rook, Wei Yu, Robert F. Erbacher, Hasan Cam:
On simulation studies of jamming threats against LTE networks. ICNC 2015: 99-103 - [c39]Noam Ben-Asher, Alessandro Oltramari, Robert F. Erbacher, Cleotilde Gonzalez:
Ontology-based Adaptive Systems of Cyber Defense. STIDS 2015: 34-41 - 2014
- [c38]Jun Xu, Pinyao Guo, Mingyi Zhao, Robert F. Erbacher, Minghui Zhu, Peng Liu:
Comparing Different Moving Target Defense Techniques. MTD@CCS 2014: 97-107 - [c37]Chen Zhong, Deepak Samuel, John Yen, Peng Liu, Robert F. Erbacher, Steve E. Hutchinson, Renee Etoty, Hasan Cam, William Glodek:
RankAOH: Context-driven similarity-based retrieval of experiences in cyber analysis. CogSIMA 2014: 230-236 - [c36]Chu Huang, Sencun Zhu, Robert F. Erbacher:
Toward Software Diversity in Heterogeneous Networked Systems. DBSec 2014: 114-129 - [c35]Nirupama Talele, Jason Teutsch, Robert F. Erbacher, Trent Jaeger:
Monitor placement for large-scale systems. SACMAT 2014: 29-40 - [p4]Alexander Kott, Cliff Wang, Robert F. Erbacher:
Preview. Cyber Defense and Situational Awareness 2014: 1-5 - [p3]Massimiliano Albanese, Robert F. Erbacher, Sushil Jajodia, Cristian Molinaro, Fabio Persia, Antonio Picariello, Giancarlo Sperlì, V. S. Subrahmanian:
Recognizing Unexplained Behavior in Network Traffic. Network Science and Cybersecurity 2014: 39-62 - [p2]John Yen, Robert F. Erbacher, Chen Zhong, Peng Liu:
Cognitive Process. Cyber Defense and Situational Awareness 2014: 119-144 - [p1]Alexander Kott, Cliff Wang, Robert F. Erbacher:
Concluding Thoughts. Cyber Defense and Situational Awareness 2014: 323-328 - [e9]Alexander Kott, Cliff Wang, Robert F. Erbacher:
Cyber Defense and Situational Awareness. Advances in Information Security 62, Springer 2014, ISBN 978-3-319-11390-6 [contents] - [i1]Robert F. Erbacher, Trent Jaeger, Nirupama Talele, Jason Teutsch:
Directed Multicut with linearly ordered terminals. CoRR abs/1407.7498 (2014) - 2013
- [c34]Maggie X. Cheng, Quanmin Ye, Robert F. Erbacher:
Visualizing graph features for fast port scan detection. CSIIRW 2013: 30 - [c33]Maggie X. Cheng, Mariesa L. Crow, Robert F. Erbacher:
Vulnerability analysis of a smart grid with monitoring and control system. CSIIRW 2013: 59 - [c32]Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher:
Using Security Policies to Automate Placement of Network Intrusion Prevention. ESSoS 2013: 17-32 - [c31]Sabrina De Capitani di Vimercati, Robert F. Erbacher, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Pierangela Samarati:
Encryption and Fragmentation for Data Confidentiality in the Cloud. FOSAD 2013: 212-243 - [c30]Maggie X. Cheng, Quanmin Ye, Robert F. Erbacher:
Characterization and visualization of sophisticated scanning attacks. ICC 2013: 2047-2051 - 2012
- [j10]Robert F. Erbacher, Rian Shelley:
GULv3 - A Novel Tool for Network Managers to Audit Networks. Int. J. Comput. Their Appl. 19(1): 26-39 (2012) - [c29]Robert F. Erbacher, Steve E. Hutchinson:
Extending Case-Based Reasoning to Network Alert Reporting. CyberSecurity 2012: 187-194 - [c28]Michael J. Shevenell, Robert F. Erbacher:
Design and Implementation of an Open Network and Host-Based Intrusion Detection Testbed with an Emphasis on Accuracy and Repeatability. ITNG 2012: 409-416 - [c27]Robert F. Erbacher, Steve E. Hutchinson:
Distributed Sensor Objects for Intrusion Detection Systems. ITNG 2012: 417-424 - [c26]Robert F. Erbacher:
Visualization design for immediate high-level situational assessment. VizSEC 2012: 17-24 - 2011
- [c25]Robert F. Erbacher, Anupama Biswas, Trent Cameron:
A novel data reduction technique. CSIIRW 2011: 35 - [c24]Robert F. Erbacher, Steve E. Hutchinson, Joshua Edwards:
Web traffic profiling and characterization. CSIIRW 2011: 71 - [c23]Robert F. Erbacher:
Preparing for the Next Wikileaks: Making Forensics Techniques Work. SADFE 2011: 1-8 - [c22]Robert B. Whitaker, Robert F. Erbacher:
A tri-linear visualization for network anomaly detection. Visualization and Data Analysis 2011: 78680P - [e8]Robert F. Erbacher, Roy H. Campbell, Yong Guan:
2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2011, Oakland, CA, USA, May 26, 2011. IEEE Computer Society 2011, ISBN 978-1-4673-1242-4 [contents] - 2010
- [j9]Robert F. Erbacher, Deborah A. Frincke, Pak Chung Wong, Sarah J. Moody, Glenn A. Fink:
A multi-phase network situational awareness cognitive task analysis. Inf. Vis. 9(3): 204-219 (2010) - [j8]Robert F. Erbacher, Karen A. Forcht:
Combining Visualization and Interaction for Scalable Detection of Anomalies in Network Data. J. Comput. Inf. Syst. 50(4): 117-126 (2010) - [c21]Robert F. Erbacher:
Validation for Digital Forensics. ITNG 2010: 756-761 - [c20]Robert F. Erbacher, Deborah A. Frincke, Pak Chung Wong, Sarah J. Moody, Glenn A. Fink:
Cognitive task analysis of network analysts and managers for network situational awareness. VDA 2010: 75300
2000 – 2009
- 2009
- [c19]Robert F. Erbacher:
Visualization for Rapid Assessment and Projection in Cyber Situational Awareness. Security and Management 2009: 475-480 - [c18]Robert F. Erbacher, Jason Daniels, Steena Dominica Steven Monteiro:
OleDetection. SADFE 2009: 85-96 - [e7]Deborah A. Frincke, Carrie Gates, John R. Goodall, Robert F. Erbacher:
6th International Workshop on Visualization for Cyber Security, VizSec 2009, Atlantic City, NJ, USA, October 11, 2009. IEEE Computer Society 2009 [contents] - 2008
- [c17]Robert F. Erbacher, Adele Cutler, Pranab Banerjee, Jim Marshall:
A Multi-Layered Approach to Botnet Detection. Security and Management 2008: 301-308 - [c16]Robert F. Erbacher:
Steps for Improving Data Comprehension for Digital Security and Forensics. Security and Management 2008: 318-326 - [c15]Sarah J. Moody, Robert F. Erbacher:
SÁDI - Statistical Analysis for Data Type Identification. SADFE 2008: 41-54 - [c14]Steena Dominica Steven Monteiro, Robert F. Erbacher:
Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model. SADFE 2008: 57-68 - [c13]Robert F. Erbacher:
The forensic validity of visual analytics. Visualization and Data Analysis 2008: 68090H - 2007
- [j7]Richard S. Swart, Robert F. Erbacher:
Educating Students to Create Trustworthy Systems. IEEE Secur. Priv. 5(3): 58-61 (2007) - [c12]Robert F. Erbacher:
Exemplifying the Inter-Disciplinary Nature of Visualization Research. IV 2007: 623-630 - [c11]Robert F. Erbacher, John Mulholland:
Identification and Localization of Data Types within Large-Scale File Systems. SADFE 2007: 55-70 - [c10]Robert F. Erbacher, Barbara Endicott-Popovsky, Deborah A. Frincke:
Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution. SADFE 2007: 150-154 - [e6]Robert F. Erbacher, Jonathan C. Roberts, Matti T. Gröhn, Katy Börner:
Visualization and Data Analysis 2007, San Jose, CA, USA, January 29-30, 2007. SPIE Proceedings 6495, SPIE 2007, ISBN 978-0-8194-6608-2 [contents] - 2006
- [j6]Sheldon Teelink, Robert F. Erbacher:
Improving the computer forensic analysis process through visualization. Commun. ACM 49(2): 71-75 (2006) - [j5]Stefano Foresti, James Agutter, Yarden Livnat, Shaun Moon, Robert F. Erbacher:
Visual Correlation of Network Alerts. IEEE Computer Graphics and Applications 26(2): 48-59 (2006) - [e5]Robert F. Erbacher, Jonathan C. Roberts, Matti T. Gröhn, Katy Börner:
Visualization and Data Analysis 2006, San Jose, CA, USA, January 15, 2006. SPIE Proceedings 6060, SPIE 2006, ISBN 978-0-8194-6100-1 [contents] - 2005
- [c9]Robert F. Erbacher, Menashe Garber:
Real-Time Interactive Visual Port Monitoring and Analysis. Security and Management 2005: 228-234 - [c8]Robert F. Erbacher:
Extending command and control infrastructures to cyber warfare assets. SMC 2005: 3331-3337 - [c7]Robert F. Erbacher, Kim Christensen, Amanda Sundberg:
Designing Visualization Capabilities for IDS Challenges. VizSEC 2005: 15 - [e4]Robert F. Erbacher, Jonathan C. Roberts, Matti T. Gröhn, Katy Börner:
Visualization and Data Analysis 2005, San Jose, CA, USA, January 17, 2005. SPIE Proceedings 5669, SPIE 2005, ISBN 978-0-8194-5642-7 [contents] - 2004
- [c6]Robert F. Erbacher:
Analysis and Management of Intrusion Data Collection. Security and Management 2004: 179-185 - [e3]Robert F. Erbacher, Philip C. Chen, Jonathan C. Roberts, Matti T. Gröhn, Katy Börner:
Visualization and Data Analysis 2004, San Jose, CA, USA, January 18, 2004. SPIE Proceedings 5295, SPIE 2004, ISBN 978-0-8194-5198-9 [contents] - 2003
- [j4]Alec Yasinsac, Robert F. Erbacher, Donald G. Marks, Mark Pollitt, Peter M. Sommer:
Computer Forensics Education. IEEE Secur. Priv. 1(4): 15-23 (2003) - [c5]Robert F. Erbacher:
Intrusion behavior detection through visualization. SMC 2003: 2507-2513 - [c4]Robert F. Erbacher, Zhouxuan Teng:
Analysis and application of node layout algorithms for intrusion detection. Visualization and Data Analysis 2003: 160-170 - [e2]Robert F. Erbacher, Philip C. Chen, Jonathan C. Roberts, Matti T. Gröhn, Katy Börner:
Visualization and Data Analysis 2003, Santa Clara, CA, USA, January 20, 2003. SPIE Proceedings 5009, SPIE 2003, ISBN 978-0-8194-4809-5 [contents] - 2002
- [j3]Robert F. Erbacher, Kenneth L. Walker, Deborah A. Frincke:
Intrusion and Misuse Detection in Large-Scale Systems. IEEE Computer Graphics and Applications 22(1): 38-48 (2002) - [c3]Robert F. Erbacher:
Glyph-based generic network visualization. Visualization and Data Analysis 2002: 228-237 - [e1]Robert F. Erbacher, Philip C. Chen, Matti Gröhn, Jonathan C. Roberts, Craig M. Wittenbrink:
Visualization and Data Analysis 2002, San Jose, CA, USA, January 19, 2002. SPIE Proceedings 4665, SPIE 2002, ISBN 978-0-8194-4405-9 [contents] - 2001
- [c2]Robert F. Erbacher:
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems. VIIP 2001: 54-59 - 2000
- [j2]Robert F. Erbacher, Alex Pang:
Guest Editorial: Special Section on Visualization and Data Analysis. J. Electronic Imaging 9(4): 354-355 (2000) - [c1]Robert F. Erbacher, Deborah A. Frincke:
Visualization in Detection of Intrusions and Misuse in Large Scale Networks. IV 2000: 294-302
1990 – 1999
- 1995
- [j1]Robert F. Erbacher, Georges G. Grinstein, John Peter Lee, Haim Levkowitz, Lisa Masterman, Ronald M. Pickett, Stuart Smith:
Exploratory visualization research at the University of Massachusetts at Lowell. Comput. Graph. 19(1): 131-139 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint