![]() ![]() The visualizations of topics and papers are inspired by the dfr-browser developed by Andrew Goldstone. We also thank Sahar Mehrpour for helping us in the visualizations presented at this site. Vivek Srikumar for his helpful guidance on topic modeling. ![]() The Authors lists all authors who published in the four conferences (from 1980-2015).The Publications provides a list of all publications from the four conferences (from 1980-2015).The Words shows all the prominent words in different topics.The Topics dropdown provides a quick way to jump to a topic without navigating to the Categories page.The Categories page shows each of the 95 topics, clustered by category.step of an attack, the adversary makes esp point to the start of the chain, effectively. Meta-data of the publications with author. Tamara Denning, Assistant Professor, School of Computing, University of Utah of many slot machines with an unknown probability distribution. The visualizations of topics and papers are inspired by the dfr-browser developed by Andrew Goldstone. Please check again!Īniqua Baset, PhD Student, School of Computing, University of Utahĭr. More visualizations to come in the future. Check out our CSET'19 paper for more deails! We present a topic modeling on the publications of the IEEE Symposium on Security & Privacy (1980-2015), the ACM Conference on Computer and Communications Security (1993-2015), the USENIX Security Symposium (1993-2015), and the Network and Distributed System Security Symposium (1997-2015).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |