| 2007 |
11 | | Jelena Mirkovic,
Alefiya Hussain,
Brett Wilson,
Sonia Fahmy,
Peter L. Reiher,
Roshan K. Thomas,
Wei-Min Yao,
Stephen Schwab:
Towards user-centric metrics for denial-of-service measurement.
Experimental Computer Science 2007: 8 |
10 | | Jelena Mirkovic,
Alefiya Hussain,
Brett Wilson,
Sonia Fahmy,
Wei-Min Yao,
Peter L. Reiher,
Stephen Schwab,
Roshan K. Thomas:
When is service really denied?: a user-centric dos metric.
SIGMETRICS 2007: 357-358 |
| 2005 |
9 | | Daniel F. Sterne,
Poornima Balasubramanyam,
David Carman,
Brett Wilson,
Rajesh Talpade,
Calvin Ko,
Ravindra Balupari,
Chin-Yang Tseng,
Thomas F. Bowen,
Karl N. Levitt,
Jeff Rowe:
A General Cooperative Intrusion Detection Architecture for MANETs.
IWIA 2005: 57-70 |
| 2004 |
8 | | Brett Wilson,
Kwan-Liu Ma:
Rendering complexity in computer-generated pen-and-ink illustrations.
NPAR 2004: 129-137 |
7 | | Eric B. Lum,
Brett Wilson,
Kwan-Liu Ma:
High-Quality Lighting for Pre-Integrated Volume Rendering.
VisSym 2004: 25-34 |
| 2002 |
6 | | Daniel F. Sterne,
Kelly Djahandari,
Ravindra Balupari,
William La Cholter,
Bill Babson,
Brett Wilson,
Priya Narasimhan,
Andrew Purtell:
Active Network Based DDoS Defense.
DANCE 2002: 193-203 |
5 | | Brett Wilson,
Eric B. Lum,
Kwan-Liu Ma:
Interactive Multi-volume Visualization.
International Conference on Computational Science (2) 2002: 102-110 |
4 | | Brett Wilson,
Kwan-Liu Ma,
Ji Qiang,
Robert D. Ryne:
Interactive Visualization of Particle Beams for Accelerator Design.
International Conference on Computational Science (3) 2002: 352-361 |
3 | | Kwan-Liu Ma,
Gregory L. Schussman,
Brett Wilson,
Kwok Ko,
Ji Qiang,
Robert D. Ryne:
Advanced visualization technology for terascale particle accelerator simulations.
SC 2002: 1-11 |
2 | | Brett Wilson,
Kwan-Liu Ma,
Patrick S. McCormick:
A hardware-assisted hybrid rendering technique for interactive volume visualization.
VolVis 2002: 123-130 |
| 2001 |
1 | | Daniel F. Sterne,
Kelly Djahandari,
Brett Wilson,
Bill Babson,
Dan Schnackenberg,
Harley Holliday,
Travis Reid:
Autonomic Response to Distributed Denial of Service Attacks.
Recent Advances in Intrusion Detection 2001: 134-149 |