Using behavior analysis algorithms to anticipate security threats before they impact mission critical operations.
Resource URI: https://dblp.l3s.de/d2r/resource/publications/conf/avss/BanksJ0CSSBMMBK07
Home
|
Example Publications
Property
Value
dcterms:
bibliographicCitation
<
http://dblp.uni-trier.de/rec/bibtex/conf/avss/BanksJ0CSSBMMBK07
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/A._Schmidt
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Annetta_Burger
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Brian_Banks
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/David_Masters
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/David_N._Chin
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Gary_M._Jackson
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/John_J._Helly_0002
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Paul_C._Brewer
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/Roger_Medd
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/T._J._Smith
>
dc:
creator
<
https://dblp.l3s.de/d2r/resource/authors/William_K._Krebs
>
foaf:
homepage
<
http://dx.doi.org/doi.org%2F10.1109%2FAVSS.2007.4425328
>
foaf:
homepage
<
https://doi.org/10.1109/AVSS.2007.4425328
>
dc:
identifier
DBLP conf/avss/BanksJ0CSSBMMBK07
(xsd:string)
dc:
identifier
DOI doi.org%2F10.1109%2FAVSS.2007.4425328
(xsd:string)
dcterms:
issued
2007
(xsd:gYear)
rdfs:
label
Using behavior analysis algorithms to anticipate security threats before they impact mission critical operations.
(xsd:string)
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/A._Schmidt
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Annetta_Burger
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Brian_Banks
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/David_Masters
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/David_N._Chin
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Gary_M._Jackson
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/John_J._Helly_0002
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Paul_C._Brewer
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/Roger_Medd
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/T._J._Smith
>
foaf:
maker
<
https://dblp.l3s.de/d2r/resource/authors/William_K._Krebs
>
swrc:
pages
307-312
(xsd:string)
dcterms:
partOf
<
https://dblp.l3s.de/d2r/resource/publications/conf/avss/2007
>
owl:
sameAs
<
http://bibsonomy.org/uri/bibtexkey/conf/avss/BanksJ0CSSBMMBK07/dblp
>
owl:
sameAs
<
http://dblp.rkbexplorer.com/id/conf/avss/BanksJ0CSSBMMBK07
>
rdfs:
seeAlso
<
http://dblp.uni-trier.de/db/conf/avss/avss2007.html#BanksJ0CSSBMMBK07
>
rdfs:
seeAlso
<
https://doi.org/10.1109/AVSS.2007.4425328
>
swrc:
series
<
https://dblp.l3s.de/d2r/resource/conferences/avss
>
dc:
title
Using behavior analysis algorithms to anticipate security threats before they impact mission critical operations.
(xsd:string)
dc:
type
<
http://purl.org/dc/dcmitype/Text
>
rdf:
type
swrc:InProceedings
rdf:
type
foaf:Document