Yurcik, William
53  Ergebnisse:
Personensuche X
?
1

Session details: Keynote:

, In: Proceedings of the 1st ACM workshop on Network data anonymization,
 
?
3

Stochastic Process Models for Packet/Analytic-Based Network..:

, In: Proceedings of the 22nd Workshop on Principles of Advanced and Distributed Simulation,
 
?
6

Command line or pretty lines? : comparing textual and vi..:

, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems,
 
?
8

Network Intrusion Detection Cognitive Task Analysis: Textua..:

Thompson, Ramona Su ; Rantanen, Esa M. ; Yurcik, William
Proceedings of the Human Factors and Ergonomics Society Annual Meeting.  50 (2006)  5 - p. 669-673 , 2006
 
?
9

Tool update : NVisionIP improvements (difference view, s..:

, In: Proceedings of the 3rd international workshop on Visualization for computer security,
Yurcik, William - p. 65-66 , 2006
 
?
10

A statistical analysis of disclosed storage security breach..:

, In: Proceedings of the second ACM workshop on Storage security and survivability,
Hasan, Ragib ; Yurcik, William - p. 1-8 , 2006
 
?
11

Tool update : visflowconnect-IP with advanced filtering ..:

, In: Proceedings of the 3rd international workshop on Visualization for computer security,
Yurcik, William - p. 63-64 , 2006
 
?
13

The evolution of storage service providers : techniques ..:

, In: Proceedings of the 2005 ACM workshop on Storage security and survivability,
 
?
14

The 'Little Man Storage' model:

, In: Proceedings of the 2005 workshop on Computer architecture education: held in conjunction with the 32nd International Symposium on Computer Architecture,
Brumbaugh, Larry ; Yurcik, William - p. 6-es , 2005
 
?
15

Toward a threat model for storage systems:

, In: Proceedings of the 2005 ACM workshop on Storage security and survivability,
Hasan, Ragib ; Myagmar, Suvda ; Lee, Adam J.. - p. 94-102 , 2005
 
1-15