default search action
Steven Noel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c18]Mehedi Hassan, Mehmet Engin Tozal, Vipin Swarup, Steven Noel, Raju Gottumukkala, Vijay Raghavan:
Anomalous Link Detection in Dynamically Evolving Scale-Free-Like Networked Systems. SysCon 2024: 1-8 - 2022
- [c17]Steven Noel, Vipin Swarup:
Dependency-Based Link Prediction for Learning Microsegmentation Policy. ICICS 2022: 569-588
2010 – 2019
- 2018
- [c16]Steven Noel:
A Review of Graph Approaches to Network Security Analytics. From Database to Cyber Security 2018: 300-323 - [c15]Steven Noel, Paul D. Rowe, Stephen Purdy, Michael Limiero, Travis Lu, Will Mathews:
Mission-focused cyber situational understanding via graph analytics. CyCon 2018: 427-448 - [i1]Alexander Kott, Benjamin A. Blakely, Diane Henshel, Gregory Wehner, James Rowell, Nathaniel Evans, Luis Muñoz-González, Nandi Leslie, Donald W. French, Donald Woodard, Kerry Krutilla, Amanda Joyce, Igor Linkov, Carmen Mas Machuca, Janos Sztipanovits, Hugh Harney, Dennis Kergl, Perri Nejib, Edward Yakabovicz, Steven Noel, Tim Dudman, Pierre Trepagnier, Sowdagar Badesha, Alfred Møller:
Approaches to Enhancing Cyber Resilience: Report of the North Atlantic Treaty Organization (NATO) Workshop IST-153. CoRR abs/1804.07651 (2018) - 2014
- [j7]Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng, Steven Noel:
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 11(1): 30-44 (2014) - [c14]Steven Noel, Sushil Jajodia:
Metrics suite for network attack graph analytics. CISR 2014: 5-8 - 2012
- [c13]Massimiliano Albanese, Sushil Jajodia, Steven Noel:
Time-efficient and cost-effective network hardening using attack graphs. DSN 2012: 1-12 - 2011
- [c12]Sushil Jajodia, Steven Noel, Pramod Kalapa, Massimiliano Albanese, John Williams:
Cauldron mission-centric cyber situational awareness with defense in depth. MILCOM 2011: 1339-1344 - 2010
- [j6]Steven Noel, Lingyu Wang, Anoop Singhal, Sushil Jajodia:
Measuring Security Risk of Networks Using Attack Graphs. Int. J. Next Gener. Comput. 1(1) (2010) - [c11]Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel:
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks. ESORICS 2010: 573-587 - [p3]Sushil Jajodia, Steven Noel:
Topological Vulnerability Analysis. Cyber Situational Awareness 2010: 139-154
2000 – 2009
- 2008
- [j5]Steven Noel, Sushil Jajodia:
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs. J. Netw. Syst. Manag. 16(3): 259-275 (2008) - [c10]Scott O'Hare, Steven Noel, Kenneth Prole:
A Graph-Theoretic Visualization Approach to Network Risk Analysis. VizSEC 2008: 60-67 - 2006
- [j4]Lingyu Wang, Steven Noel, Sushil Jajodia:
Minimum-cost network hardening using attack graphs. Comput. Commun. 29(18): 3812-3824 (2006) - 2005
- [c9]Steven Noel, Sushil Jajodia:
Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. ACSAC 2005: 160-169 - [c8]Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia:
Multiple Coordinated Views for Network Attack Graphs. VizSEC 2005: 12 - 2004
- [c7]Steven Noel, Eric Robertson, Sushil Jajodia:
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances. ACSAC 2004: 350-359 - [c6]Steven Noel, Sushil Jajodia:
Managing attack graph complexity through visual hierarchical aggregation. VizSEC 2004: 109-118 - 2003
- [j3]Steven Noel, Chee-Hung Henry Chu, Vijay V. Raghavan:
Co-Citation count vs correlation for influence network visualization. Inf. Vis. 2(3): 160-170 (2003) - [j2]Harold Szu, Steven Noel, Seong-Bin Yim, Jefferson M. Willey, Joe Landa:
Multimedia authenticity protection with ICA watermarking and digital bacteria vaccination. Neural Networks 16(5-6): 907-914 (2003) - [c5]Steven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs:
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs. ACSAC 2003: 86-95 - [p2]Steven Noel, Vijay V. Raghavan, Chee-Hung Henry Chu:
Document Clustering, Visualization, and Retrieval Link Mining. Clustering and Information Retrieval 2003: 161-194 - 2002
- [c4]Ronald W. Ritchey, Brian O'Berry, Steven Noel:
Representing TCP/IP Connectivity For Topological Analysis of Network Security. ACSAC 2002: 25-31 - [c3]Steven Noel, Chee-Hung Henry Chu, Vijay V. Raghavan:
Visualization of Document Co-Citation Counts. IV 2002: 691-696 - [p1]Steven Noel, Duminda Wijesekera, Charles E. Youman:
Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt. Applications of Data Mining in Computer Security 2002: 1-31 - 2001
- [c2]Steven Noel, Vijay V. Raghavan, Chee-Hung Henry Chu:
Visualizing Association Mining Results through Hierarchical Clusters. ICDM 2001: 425-432
1990 – 1999
- 1998
- [j1]Steven Noel, Harold Szu:
Proximity sensing with wavelet-generated video. J. Electronic Imaging 7(4): 770-780 (1998) - 1997
- [c1]Steven Noel, Harold Szu:
Multiple-resolution divide and conquer neural networks for large-scale TSP-like energy minimization problems. ICNN 1997: 1278-1283
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-25 20:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint