Author: Robert F. Erbacher

Publication Overview

Publication period start: 1995
Number of co-authors: 15

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Teelink, Sheldon, Erbacher, Robert F. (2006): Improving the computer forensic analysis process through visualization. In Communications of the ACM, 49 (2) pp. 71-75. https://dl.acm.org/doi/10.1145/1113034.1113073
Foresti, Stefano, Agutter, James, Livnat, Yarden, Moon, Shaun, Erbacher, Robert F. (2006): Visual Correlation of Network Alerts. In IEEE Computer Graphics and Applications, 26 (2) pp. 48-59. https://doi.ieeecomputersociety.org/10.1109/MCG.2006.49
Erbacher, Robert F., Walker, Kenneth L., Frincke, Deborah A. (2002): Intrusion and Misuse Detection in Large-Scale Systems. In IEEE Computer Graphics and Applications, 22 (1) pp. 38-48. https://csdl.computer.org/comp/mags/cg/2002/01/g1038abs.htm
Erbacher, Robert F., Grinstein, Georges G., Lee, John Peter, Levkowitz, Haim, Masterman, Lisa, Pickett, Ron, Smith, Stuart (1995): Exploratory visualization research at the University of Massachusetts at Lowell. In Computers & Graphics, 19 (1) pp. 131-139. https://dx.doi.org/10.1016/0097-8493(94)00128-L
Erbacher, Robert F., Christensen, Kim, Sundberg, Amanda (2005): Designing Visualization Capabilities for IDS Challenges. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 15. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.5
Erbacher, Robert F., Frincke, Deborah A. (2000): Visualization in Detection of Intrusions and Misuse in Large Scale Networks. In: IV 2000 , 2000, . pp. 294-. https://csdl.computer.org/comp/proceedings/iv/2000/0743/00/07430294abs.htm
Erbacher, Robert F. (2007): Exemplifying the Inter-Disciplinary Nature of Visualization Research. In: IV 2007 - 11th International Conference on Information Visualisation 2-6 July, 2007, Zürich, Switzerland. pp. 623-630. https://doi.ieeecomputersociety.org/10.1109/IV.2007.49
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Get one powerful email each week, like 326,032 others.

Learn to design a life you love.

Next email in
6
days
4
hrs
40
mins
37
secs