My ICASSP 2013 Schedule
Note: Your custom schedule will not be saved unless you create a new account or login to an existing account.
- Create a login based on your email (takes less than one minute)
- Perform 'Paper Search'
- Select papers that you desire to save in your personalized schedule
- Click on 'My Schedule' to see the current list of selected papers
- Click on 'Printable Version' to create a separate window suitable for printing (the header and menu will appear, but will not actually print)
Paper Detail
Paper: | .13 | ||
Session: | Communications/Network Security | ||
Session Time: | Thursday, May 30, 15:20 - 17:20 | ||
Presentation Time: | Thursday, May 30, 15:20 - 17:20 | ||
Presentation: | Poster | ||
Topic: | Information Forensics and Security: Communications and Network Security | ||
Paper Title: | PROBABILISTIC THREAT PROPAGATION FOR MALICIOUS ACTIVITY DETECTION | ||
Authors: | Kevin Carter; Massachusetts Institute of Technology, Lincoln Laboratory | ||
Nwokedi Idika; Massachusetts Institute of Technology, Lincoln Laboratory | |||
William Streilein; Massachusetts Institute of Technology, Lincoln Laboratory |