1. Software and algorithms for graph queries on multithreaded architectures;Berry,2007
2. Plugging the cyber-security skills gap;Caldwell;Comput Fraud Secur,2013
3. Understanding the context of network traffic alerts;Cappers,2016
4. Achieving accuracy and scalability simultaneously in detecting application clones on android markets;Chen,2014
5. Experience-based cyber situation recognition using relaxable logic patterns;Chen,2012