Multimedia authenticity protection with ICA watermarking and digital bacteria vaccination
Szu, Harold, Noel, Steven, Yim, Seong-Bin, Willey, Jeff, Landa, Joe
Published in Neural networks (01.06.2003)
Published in Neural networks (01.06.2003)
Get full text
Journal Article
Conference Proceeding
Co-Citation Count vs Correlation for Influence Network Visualization
Noel, Steven, Chu, Chee-Hung Henry, Raghavan, Vijay
Published in Information visualization (01.09.2003)
Published in Information visualization (01.09.2003)
Get full text
Journal Article
Time-efficient and cost-effective network hardening using attack graphs
Albanese, M., Jajodia, S., Noel, S.
Published in IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012) (01.06.2012)
Published in IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012) (01.06.2012)
Get full text
Conference Proceeding
Cauldron mission-centric cyber situational awareness with defense in depth
Jajodia, S., Noel, S., Kalapa, P., Albanese, M., Williams, J.
Published in 2011 - MILCOM 2011 Military Communications Conference (01.11.2011)
Published in 2011 - MILCOM 2011 Military Communications Conference (01.11.2011)
Get full text
Conference Proceeding
Physical activity and body mass index as predictors of prostate cancer risk
Grotta, Alessandra, Bottai, Matteo, Adami, Hans-Olov, Adams, Swann Arp, Akre, Olof, Blair, Steven Noel, Mariosa, Daniela, Nyrén, Olof, Ye, Weimin, Stattin, Pär, Bellocco, Rino, Trolle Lagerros, Ylva
Published in World journal of urology (01.10.2015)
Published in World journal of urology (01.10.2015)
Get full text
Journal Article
Understanding complex network attack graphs through clustered adjacency matrices
Noel, S., Jajodia, S.
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)
Get full text
Conference Proceeding
Correlating intrusion events and building attack scenarios through attack graph distances
Noel, S., Robertson, E., Jajodia, S.
Published in 20th Annual Computer Security Applications Conference (2004)
Published in 20th Annual Computer Security Applications Conference (2004)
Get full text
Conference Proceeding
Efficient minimum-cost network hardening via exploit dependency graphs
Noel, S., Sushil Jajodia, O'Berry, B., Jacobs, M.
Published in 19th Annual Computer Security Applications Conference, 2003. Proceedings (2003)
Published in 19th Annual Computer Security Applications Conference, 2003. Proceedings (2003)
Get full text
Conference Proceeding
Anomalous Link Detection in Dynamically Evolving Scale-Free-Like Networked Systems
Hassan, Mehedi, Tozal, Mehmet Engin, Swarup, Vipin, Noel, Steven, Gottumukkala, Raju, Raghavan, Vijay
Published in 2024 IEEE International Systems Conference (SysCon) (15.04.2024)
Published in 2024 IEEE International Systems Conference (SysCon) (15.04.2024)
Get full text
Conference Proceeding