A Phylogenetic Approach to Analyzing IP-Address Artifacts of Cyber-Attacks

Jack Horner. A Phylogenetic Approach to Analyzing IP-Address Artifacts of Cyber-Attacks. In Hamid R. Arabnia, Kevin Daimi, Michael R. Grimaila, George Markowsky, Selim Aissi, Victor A. Clincy, Leonidas Deligiannidis, Donara Gabrielyan, Gevorg Margarov, Ashu M. G. Solo, Craig Valli, Patricia A. H. Williams, editors, Proceedings of the 2010 International Conference on Security & Management, SAM 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes. pages 94-98, CSREA Press, 2010.

@inproceedings{Horner10-2,
  title = {A Phylogenetic Approach to Analyzing IP-Address Artifacts of Cyber-Attacks},
  author = {Jack Horner},
  year = {2010},
  tags = {systematic-approach},
  researchr = {https://researchr.org/publication/Horner10-2},
  cites = {0},
  citedby = {0},
  pages = {94-98},
  booktitle = {Proceedings of the 2010 International Conference on Security & Management, SAM 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes},
  editor = {Hamid R. Arabnia and Kevin Daimi and Michael R. Grimaila and George Markowsky and Selim Aissi and Victor A. Clincy and Leonidas Deligiannidis and Donara Gabrielyan and Gevorg Margarov and Ashu M. G. Solo and Craig Valli and Patricia A. H. Williams},
  publisher = {CSREA Press},
  isbn = {1-60132-163-5},
}