Publications

Publications associated with IEEE are © IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

Publications associated with ACM are © ACM. The paper versions below are the author's versions of the work. They are posted here by permission of ACM for your personal use. Not for redistribution. The definitive version will be published in the associated conference proceedings.

Publications associated with SPIE are © SPIE and IS&T. The paper was published in the associated SPIE conference and is made available as an electronic reprint (preprint) with permission of SPIE and IS&T. One print or electronic copy may be made for personal use only. Systematic or multiple reproduction, distribution to multiple locations via electronic or other means, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper are prohibited.

Publications (graduate studentsundergraduate students):

Journal Publications:

·   Robert F. Erbacher and Steve Hutchinson, “Case-Based Reasoning Extensions for Network Alert Reporting,”International Journal of Advancements in Computing Technology (IJACT), Vol. 8, No. 2, March 2016, pp. 88-107.

·   Zhijiang ChenLinqiang GeGuobin Xu, Wei Yu, Robert F. Erbacher, Hasan Cam, and Nnanna Ekedebe, “A threat monitoring system in enterprise networks with smart mobiles,” Int. J. Security and Networks, Vol. 11, Nos. 1/2, 2016, pp.66–81.

·   Robert F. Erbacher, Rian ShelleySteena Monteiro, “GULv3—A Novel Tool for Network Managers to Audit Networks,” ISCA International Journal of Computers and Their Applications (IJCA), Vol. 19, No. 1, March 2012, pp. 26-39.

·   Robert F. Erbacher, Anupama BiswasTrent Cameron, “Novel Data Reduction Techniques in Large-Scale Network Infrastructures through Impact and Vulnerability Assessment,” International Journal of Advancements in Computing Technology (IJACT), Vol. 4, No. 1, March 2012, pp. 32-48.

·   Robert F. Erbacher, Deborah A. Frincke, Sarah J. Moody, Glenn Fink, “A Multi-Phase Network Situational Awareness Cognitive Task Analysis,” Information Visualization Journal, Vol. 9, No. 3, September 2010, pp. 204-219.

·   Robert F. Erbacher and Karen A. Forcht, “Combining Visualization and Interaction for Scalable Detection of Anomalies in Network Data,” Journal of Computer Information Systems, Vol. 50, No. 4, Summer 2010, pp. 117-126.

·   Steena Monteiro and Robert F. Erbacher, “An Authentication and Validation Mechanism for Analyzing Syslogs Forensically,” ACM SIGOPS Operating Systems Review, Vol. 42, No. 3, 2008, pp. 41-50.

·   Richard Swart and Robert F. Erbacher, “Educating Students to Create Trustworthy Computer and Information Systems,” IEEE Security & Privacy, Vol. 5, No. 3, May/June 2007, pp. 58-61.

·   Stefano Foresti, James Agutter, Yarden Livnat, Robert Erbacher, and Shaun Moon, “Visual Correlation of Network Alerts,” Computer Graphics and Applications, Vol. 26, No. 2, March/April 2006, pp. 48-59.

·   Sheldon Teerlink and Robert F. Erbacher, “Improving the Computer Forensic Analysis Process through Visualization,” Communications of the ACM, Vol. 49, No. 2, 2006, pp. 71-75.

·   Alec Yasinsac, Robert Erbacher, Donald G. Marks, Mark M. Pollitt, and Peter Sommer, “Computer Forensics Education,” IEEE Security and Privacy, Vol. 1, No. 4, 2003, pp. 15-23.

·   Matthew J. Pastizzo, Robert F. Erbacher, and Laurie B. Feldman, “Multi-Dimensional Data Visualization,”Behavior Research Methods, Instruments, and Computers, Vol. 34, No. 2, 2002, pp. 158-162.

·   Robert F. Erbacher, Kenneth L. Walker, and Deborah A. Frincke, “Intrusion and Misuse Detection in Large-Scale Systems,” Computer Graphics and Applications, Vol. 22, No. 1, January/February 2002, pp. 38-48.

·   Robert F. Erbacher and Alex Pang, “Special Section on Visualization and Data Analysis,” Guest Editorial: Journal of Electronic Imaging, Vol. 9, No. 4, October 2000, pp. 354-355.

·   Robert F. Erbacher and Georges G. Grinstein, “Visual Data Exploration and Analysis II,” Editorial: IEEEComputational Science & Engineering, Summer 1995, pp. 85.

·   Robert F. Erbacher, Georges G. Grinstein, John Peter Lee, Haim Levkowitz, Lisa Masterman, Ron Pickett, and Stuart Smith, “Exploratory Visualization Research at the University of Massachusetts at Lowell,” Computers & Graphics, Vol. 19, No. 1, 1995, pp. 131-139.

                                    

Book Chapters:

·   Sabrina De Capitani di Vinnercati, Robert F. Erbacher, Sara Foresti, Sushil Jajodia, Giovanno Livraga, and Pierangela Samarati,” Encryption and fragmentation for data confidentiality in the cloud,” Springer Foundations of Security Analysis and Design VII, December 2014, pp. 212-243.

·   John Yen, Robert Erbacher, Cheng Zhong, and Peng Liu, “Cognitive Process,” Springer Cyber Defense and Situational Awareness, December 2014, pp. 119-144.

·   Massimiliano Albanese, Robert Erbacher, Sushil Jajodia, Cristian Molinaro, Fabio Persia, Antonio Picariello, Giancarlo Sperl`ı, and V. S. Subrahmanian, “Recognizing Unexplained Behavior in Network Intrusions,”Springer Network Science and Cybersecurity: Advances in Information Security, January 2014, pp. 39-62.

·   Alexander Kott, Cliff Wang, Robert F. Erbacher, “Preview,” Cyber Defense and Situational Awareness, Springer 2014, pp. 1-5.

·   Alexander Kott, Cliff Wang, Robert F. Erbacher, “Concluding Thoughts,” Cyber Defense and Situational Awareness, Springer 2014, pp. 323-328.

 

Refereed Full Conference and Workshop Papers (Presenter Noted with *):

·   Chen Zhong, John Yen, Peng Liu, and Robert F. Erbacher. “Automate Cybersecurity Data Triage by Leveraging Human Analysts' Cognitive Process.” In 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), pp. 357-363. IEEE, 2016.

·   Maggie X. Cheng*, Quanmin Ye, Xiaochun Cheng, Robert F. Erbacher, “Network coding and coding-aware scheduling for multicast in wireless networks,” Proceedings of the IEEE International Conference on Communications (ICC), London, UK, June 2015, pp. 5703-5708.

·   Noam Ben-Asher*, Alessandro Oltramari, Robert F. Erbacher, Cleotilde Gonzalez, “Ontology-based Adaptive Systems of Cyber Defense,” Proceedings of the Conference on Semantic Technology for Intelligence, Defense, and Security (STIDS), Fairfax, VA, November 2015, pp. 34-41.

·   Chen Zhong*, John Yen, Peng Liu, Rob Erbacher, Renee Etoty, Christopher Garneau “An Integrated Computer-Aided Cognitive Task Analysis Method for Tracing Cyber-Attack Analysis Processes,” Proceedings of the 2015 Symposium and Bootcamp on the Science of Security (HotSoS). ACM, New York, NY, USA, 2015, pp. 9-19.

·   Chen Zhong*, John Yen, Peng Liu, Robert Erbacher, Renee Etoty, and Chris Garneau, “ARSCA: A Computer Tool for Tracing the Cognitive Processes of Cyber-Attack Analysis,” Proceedings of the Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), 2015 IEEE International Inter-Disciplinary Conference on, 9-12 March 2015, pp.165-171.

·   Sulabh Bhattarai*, Sixiao WeiStephen Rook, Wei Yu, Robert F. Erbacher, and Hasan Cam, “On Simulation Studies of Jamming Threats Against LTE Networks,” Proceedings of the IEEE International Conference on Computing, Networking, and Communications, February 2015, Anaheim, CA, pp. 99-103.

·   Steve Hutchinson*, John Wittkamper, Jovina Allen, and Robert F. Erbacher, “cnetmon: A Curses-Based Network Interface Activity Monitor,” Proceedings of the International Conference on Software Engineering Research and Practice (SERP), July 2015, p. 157-163.

·   Steve Hutchinson* and Robert F. Erbacher, “ASN reputation system model,” Proc. SPIE 9458, Proceedings of Cyber Sensing 2015, 94580A, May 14, 2015.

·   Jun Xu*Pinyao GuoMingyi Zhao, Robert F. Erbacher, Minghui Zhu, Peng Liu, “Comparing Different Moving Target Defense Techniques” Proceedings of the ACM Moving Target Defense Conference, Scottsdale, Arizona, November 2014, pp. 97-107.

·   Chu Huang*, Sencun Zhu, Robert F. Erbacher, “Toward Software Diversity in Heterogeneous Networked Systems,” Proceedings of the IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), Vienna, Austria, July 2014, pp. 114-129.

·   Nirupama Talele*, Jason Teutsch, Robert Erbacher, and Trent Jaeger, “Monitor Placement for Large-Scale Systems,” Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT),London, ON, Canada, June 2014, pp. 29-40.

·   Chen Zhong*, Deepak Samuel, John Yen, Peng Liu, Robert F. Erbacher, Steve Hutchinson, Renee Etoty, Hasan Cam, and William Glodek, “RankAOH: Context-driven Similarity-based Retrieval of Experiences in Cyber Analysis,” Proceedings of the IEEE Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), San Antonio, TX, March 2014, pp.230,236.

·   Maggie Cheng*, Quanmin Ye, Robert F. Erbacher, “Characterization and Visualization of Sophisticated Scanning Attacks,” Proceedings of the IEEE Communications and Information Systems Security Symposium, June 2013, pp. 2047-2051.

·   Nirupama Talele*, Jason Teutsch, Trent Jaeger, and Robert F. Erbacher, “Using Security Policies to Automate Monitor Placement,” Proceedings of the IEEE Conference on Engineering Secure Software and Systems (ESSOS), Paris, France, February 2013, pp. 17-32.

·   Maggie Cheng*, Quanmin Ye, Robert F. Erbacher, “Visualizing Graph Features for Scanning Attack Detection,” Proceedings of CSIIRW, Oak Ridge, TN, January 2013.

·   Maggie Cheng*, Mariesa Crow, Robert F. Erbacher, “Vulnerability Analysis of a Smart Grid with Monitoring and Control System,” Proceedings of CSIIRW, Oak Ridge, TN, January 2013.

·   Robert F. Erbacher and Steve Hutchinson*, “Extending Case-Based Reasoning to Automated Alert Assessment,” Proceedings of the ASE International Conference on Cyber Security, Washington, DC, December 2012.

·   Robert F. Erbacher*, “Visualization Design for Immediate High-Level Situational Assessment,” Proceedings of the IEEE Workshop on Visualization for Computer Security, Seattle, WA, October 2012.

·   Jeff Rowe*, Karl N. Levitt, Tufan Demir, Robert F. Erbacher, “Artificial Diversity as Maneuvers in a Control Theoretic Moving Target Defense,” Proceedings of the National Moving Target Research Symposium, Annapolis, MD, June 2012.

·   Robert F. Erbacher and Steve Hutchinson*, “Distributed Sensor Objects for Intrusion Detection Systems,”Proceedings of the International Conference on Information Technology - New Generations (ITNG), Las Vegas, NV, April, 2012pp. 417-424.

·   Michael J. Shevenell* and Robert F. Erbacher, “Design and Implementation of an Open Network and Host-Based Intrusion Detection Test bed with an Emphasis on Accuracy and Repeatability,” Proceedings of theInternational Conference on Information Technology - New Generations (ITNG), Las Vegas, NV, April, 2012, pp. 409-416.

·   Robert F. Erbacher*, Anupama Biswas, and Trent Cameron, “A Novel Data Reduction Technique,” Proceedings of the Cyber Security and Information Intelligence Research Workshop, Oakridge, TN, October 2011, Article 35.

·   Robert F. Erbacher*, Steve Hutchinson, and Joshua Edwards, “Web Traffic Profiling and Characterization,”Proceedings of the Cyber Security and Information Intelligence Research Workshop, Oakridge, TN, October 2011, Article 71.

·   Robert F. Erbacher*, “Preparing for the Next WikiLeaks: Making Forensics Techniques Work,” Proceedings of the 6th IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, May 2011, pp. 1-8.

·   Robert Whitaker and Robert F. Erbacher*, “A Tri-Linear Visualization for Network Anomaly Detection,”Proceedings of the SPIE ‘2011 Conference on Visualization and Data Analysis, San Francisco, CA, January 2011, pp. 78680P-1...78680P-12.

·   Robert F. Erbacher*, “Validation for Digital Forensics,” Proceedings of the The International Conference on Information Technology - New Generations (ITNG), Las Vegas, NV, April 2010, pp. 756-761.

·   Robert F. Erbacher*, Deborah A. Frincke, Sarah J. Moody, Glenn Fink, “Cognitive Task Analysis of Network Analysts and Managers for Network Situational Awareness,” Proceedings of the SPIE 2010 Conference on Visualization and Data Analysis, Santa Clara, CA, January 2010, pp. 75300H-1-75300H-12. Best Paper Award.

·   Robert F. Erbacher*, “Visualization for Rapid Assessment and Projection in Cyber Situational Awareness,”Proceedings of the International Conference on Security and Management, Las Vegas, NV, July 2009, pp. 475-480.

·   Robert F Erbacher*, Jason Daniels, and Steena Monteiro, “OleDetection: Forensics and Anti-Forensics of Covert Channels in OLE2-Formatted Documents,” Proceedings of the 4th IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, May 2009, pp. 85-96.

·   Steena Dominica Steven Monteiro* and Robert F. Erbacher, “Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model,” Proceedings of the 3rd IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, May 2008, pp. 57-68.

·   Sarah J. Moody* and Robert F. Erbacher, “SÁDI – Statistical Analysis for Data type Identification,”Proceedings of the 3rd IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, May 2008, pp. 41-54.

·   Robert F. Erbacher*, Adele Cutler, Pranab Banerjee, and Jim Marshall, “A Multi-Layered Approach to Botnet Detection,” Proceedings of the International Conference on Security and Management, Las Vegas, NV, July 2008, pp. 301-308.

·   Robert F. Erbacher*, “Steps for Improving Data Comprehension for Digital Security and Forensics,”Proceedings of the International Conference on Security and Management, Las Vegas, NV, July 2008, pp. 318-326.

·   Robert F. Erbacher, “The Forensic Validity of Visual Analytics,” Proceedings of the SPIE 2008 Conference on Visualization and Data Analysis, San Jose, CA, January, 2008, pp. 68090H-1-68090H-10. Invited Paper.

·   Vikas P. Deshpande*, Robert F. Erbacher, and Chris Harris, “An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques,” Proceedings of the IEEE Information Assurance Workshop, West Point, NY, June 2007, pp. 333-340.

·   Robert F. Erbacher*, “Exemplifying the Inter-Disciplinary Nature of Visualization Research,” Proceedings of IV07: 11th International Conference Information Visualization, Zurich, Switzerland, July 2007, pp. 623-630.

·   Robert F. Erbacher* and Deborah A. Frincke, “Hierarchical Linked Views,” Proceedings of the 2007 Coordinated and Multiple Views in Exploratory Visualization Conference, Zurich, Switzerland, July 2007, pp. 35-46.

·   Richard Swart* and Robert F. Erbacher, “Legal Developments in eDiscovery: Implications for Security Management,” Proceedings of the 6th Security Conference, Las Vegas, NV, 12 Pages, April 2007.

·   Robert F. Erbacher, Shashi Prakash*Chet ClaarJason Couraud, “Intrusion Detection: Detecting Masquerade Attacks Using UNIX Command Lines,” Proceedings of the 6th Security Conference, Las Vegas, NV, 18 Pages, April 2007.

·   Robert F. Erbacher* and John Mulholland, “Identification and Localization of Data Types within Large-Scale File Systems,” Proceedings of the 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering, Seattle, WA, April 2007, pp. 55-70. Best Paper Award.

·   Robert F. Erbacher*, Kim Christensen, and Amanda Sundberg, “Visual Forensic Techniques and Processes,”Proceedings of the 9th Annual NYS Cyber Security Conference Symposium on Information Assurance, Albany, NY, June 2006, pp. 72-80.

·   Sheldon Teerlink* and Robert F. Erbacher, “Foundations of Visual Forensic Analysis,” Proceedings of the IEEE Information Assurance Workshop, West Point, NY June 2006, pp. 192-199. Best Paper Nomination.

·   Robert F. Erbacher, Richard Swart*, and Matt Harris, “Computer Forensics: Training and Education,”Proceedings of the 5th Security Conference, Las Vegas, NV, 10 Pages, April 2006.

·   Robert F. Erbacher*, Kim Christensen, and Amanda Sundberg, “Designing Visualization Capabilities for IDS Challenges,” Proceedings of the IEEE Workshop on Visualization for Computer Security, Minneapolis, MN, October 2005, pp. 121-127.

·   Robert F. Erbacher*, “Extending Command and Control Infrastructures to Cyber Warfare Assets,” Proceedings of the IEEE Systems, Man, and Cybernetics (SMC), Waikoloa, HI, October 2005, pp. 3331-3337.

·   Yarden Livnat, Jim Agutter, Shaun Moon, Robert F. Erbacher*, and Stefano Foresti, “A Visualization Paradigm for Network Intrusion Detection,” Proceedings of the IEEE Information Assurance Workshop, West Point, NY June 2005, pp. 92-99. Best Paper Nomination.

·   Robert F. Erbacher* and Menashe Garber, “Visualization Techniques for Intrusion Behavior Identification,”Proceedings of the IEEE Information Assurance Workshop, West Point, NY, June 2005, pp. 84-91.

·   Robert F. Erbacher* and Menashe Garber, “Real-Time Interactive Visual Port Monitoring and Analysis,”Proceedings of the International Conference on Security and Management, Las Vegas, NV, June 2005, pp. 228-234.

·   Michael Farnsworth* and Robert F. Erbacher, “Global Illumination: Efficient Renderer Design and Architecture,” Proceedings of the International Conference on Geometric Modeling, Visualization & Graphics2005, Salt Lake City, UT, July 2005, pp. 1691-1695.

·   David McDonald and Robert F. Erbacher*, “Hardware Accelerated Graphics in Java,” Proceedings of the International Conference on Geometric Modeling, Visualization & Graphics 2005, Salt Lake City, UT, July 2005, pp. 1708-1712.

·   Robert F. Erbacher* and Menashe Garber, “Interactive and Dynamic Visual Port Monitoring and Analysis,”Proceedings of the International Conference on Geometric Modeling, Visualization & Graphics 2005, Salt Lake City, UT, July 2005, pp. 1704-1707.

·   Zhifu You*, Charles L. Thomas, and Robert F. Erbacher, “A 3D Shape Measurement System,” Proceedings of the International Conference on Geometric Modeling, Visualization & Graphics 2005, Salt Lake City, UT, July 2005, pp. 1686-1690.

·   Robert F. Erbacher* and Menashe Garber, “Fusion and Summarization of Behavior for Intrusion Detection Visualization,” Proceedings of the IASTED International Conference On Visualization, Imaging, and Image Processing, Marbella, Spain, September 6 - 8, 2004, pp. 159-165.

·   Robert F. Erbacher*, “Analysis and Management of Intrusion Data Collection,” Proceedings of the 2004 International Conference on Security and Management (SAM ‘04), Las Vegas, NV, June 2004, pp. 179-185.

·   Robert F. Erbacher*, “Intrusion Behavior Detection through Visualization,” Proceedings of the IEEE Systems, Man & Cybernetics Conference, Crystal City, Virginia, October 2003, pp. 2507-2513.

·   Robert F. Erbacher* and Zhouxuan Teng, “Analysis and Application of Node Layout Algorithms for Intrusion Detection,” Proceedings of the SPIE 2003 Conference on Visualization and Data Analysis, Santa Clara, CA, January, 2003, pp. 160-170.

·   Robert F. Erbacher*, Zhouxuan Teng, and Siddharth Pandit, “Multi-Node Monitoring and Intrusion Detection,”Proceedings of the IASTED International Conference On Visualization, Imaging, and Image Processing, Malaga, Spain, September 9 - 12, 2002, pp. 720-725.

·   Robert F. Erbacher*, “A Component-Based Event-Driven Interactive Visualization Software Architecture,”Proceedings of the 2002 International Symposium on Information Systems and Engineering (ISE 2002), San Diego, CA, July 2002, pp. 237-243.

·   Robert F. Erbacher* and Bill Augustine, “Intrusion Detection Data: Collection and Analysis,” Proceedings of the 2002 International Conference on Security and Management (SAM ‘02), Las Vegas, NV, June 2002, pp. 3-9.

·   Robert F. Erbacher*, “Glyph-Based Generic Network Visualization,” Proceedings of the SPIE 2002 Conference on Visualization and Data Analysis, San Jose, CA, January, 2002, pp. 228-237.

·   Robert F. Erbacher and Karl Sobylak, “Improving Intrusion Analysis Effectiveness,” Proceedings of the 2002 Workshop on Computer Forensics, Moscow, ID, September 2002.

·   Robert F. Erbacher*, “Visual Behavior Characterization for Intrusion Detection in Large Scale Systems,”Proceedings of the IASTED International Conference On Visualization, Imaging, and Image Processing, Marbella, Spain, September 3 - 5, 2001, pp. 54-59. Color version available.

·   Robert F. Erbacher*, “Visual Traffic Monitoring and Evaluation,” Proceedings of the Conference on Internet Performance and Control of Network Systems II, Denver, CO, August 2001, pp. 153-160.

·   Robert F. Erbacher*, “User Issues in Visual Monitoring Environments,” Proceedings of the 2001 International Conference on Imaging Science, Systems, and Technology 2001, Vol. 2, Las Vegas, NV, June, 2001, pp. 644-650.

·   Robert F. Erbacher*, “Interactive Program Debugging,” Proceedings of the 2001 International Conference on Imaging Science, Systems, and Technology 2001, Vol. 1, Las Vegas, NV, June, 2001, pp. 219-224.

·   Robert F. Erbacher* and Deborah Frincke, “Visual Behavior Characterization for Intrusion and Misuse Detection,” Proceedings of the SPIE 2001 Conference on Visual Data Exploration and Analysis VIII, San Jose, CA, January, 2001, pp. 210-218.

·   Robert F. Erbacher* and Deborah Frincke, “Visualization in Detection of Intrusions and Misuse in Large Scale Networks,” Proceedings of the International Conference on Information Visualization 2000, London, UK, July, 2000, pp. 294-299.

·   Robert F. Erbacher*, “Visual Steering for Program Debugging,” Proceedings of the SPIE 0 Conference on Visual Data Exploration and Analysis VII, San Jose, CA, January, 0, pp. 106-113.

·   Robert F. Erbacher* and Georges G. Grinstein, “Program visualization: bringing visual analysis to code development,” Proceedings of the SPIE ’99 Conference on Visual Data Exploration and Analysis VI, San Jose, CA, January, 1999, pp. 32-39.

·   Robert F. Erbacher*, “Visual debugging of data and operations for concurrent programs,” Proceedings of theSPIE ’97 Conference on Visual Data Exploration and Analysis IV, San Jose, CA, February, 1997, pp. 120-128.

·   Robert F. Erbacher and David A. Southard*, “Rapid Modeling of C2 Simulations,” Proceedings of the Conference of the Society for Information Display, Santa Ana, CA, May 1996, pp. 139-142.

·   Robert F. Erbacher* and Georges G. Grinstein, “Visualization of Data for the Debugging of Concurrent Systems,” Proceedings of the SPIE ‘96 Conference on Visual Data Exploration and Analysis III, San Jose, CA, February, 1996, pp. 140-149.

·   Robert F. Erbacher* and Georges G. Grinstein, “Issues in the Development of 3D Icons,” Proceedings ofVisualization in Scientific Computing, Springer-Verlag, 1995, pp. 109-123.

·   Robert F. Erbacher*, David Gonthier, and Haim Levkowitz, “The color icon: A new design and a parallel implementation,” Proceedings of the SPIE ‘95 Conference on Visual Data Exploration and Analysis II, San Jose, CA, February, 1995, pp. 302-312.

·   Robert F. Erbacher* and Georges G. Grinstein, “Performance issues in a real-time true color data display,”Proceedings of the SPIE ‘95 Conference on Visual Data Exploration and Analysis II, San Jose, CA, February, 1995, pp. 256-262.

·   Robert F. Erbacher* and David A. Southard, “Interactive Visualization of C2 Simulations,” Proceedings of the Summer Conference on Computer Simulation. Ottawa, Ontario. July 1995, pp. 223-228.

·   Grinstein, G., V.G. Prakash and R. Erbacher, “Modifying and Using Khoros for Building Interactive Closed Form Imaging Applications,” in the Khoros Users Group Workshop Proceedings held during Visualization ‘92, Boston, October 21-25, 1992.

                                     

Technical Reports:

·   Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “Observability Assumptions for Cyber Analysis,” U.S. Army Research Laboratory, Contractor’s Report #under PreparationAdelphi, MD, May 2016.

·   Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “Synthetic additions to PSU Shift Transition study data-set,” U.S. Army Research Laboratory, Contractor’s Report #under preparationAdelphi, MD, May 2016.

·   Robert F. Erbacher, Renee Etoty, Steve Hutchinson, Chris Garneau, John Yen, Peng Liu, Chen Zhong, Vasant Honavar, Ping Li, Nanyin Zhang, Xiaoxiao Bai, Fengyang Ma, Qing Yang, “Studying Cognitive, Visual, and Neural Functions of Network Security Analysts Using EEG,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   Robert F. Erbacher, Renee Etoty, Steve Hutchinson, Chris Garneau, John Yen, Peng Liu, Chen Zhong, Vasant Honavar, Ping Li, Nanyin Zhang, Qing Yang, Timothy Mosher, “Studying Neural, Visual, and Cognitive Processes of Network Security Analysts Using fMRI, EEG, and Eye Tracking,” U.S. Army Research Laboratory,Technical Note #In PressAdelphi, MD, May 2016.

·   John WittKamper, Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “Cnetmon: network traffic monitor,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   John WittKamper, Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “COLD: (ARL sensor) network traffic collection daemon,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   John WittKamper, Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “VSNAP: (ARL sensor) network traffic collector and data-type file generator,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   John WittKamper, Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “XFLOW: (ARL) flowfile query and conversion tool,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   John WittKamper, Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “iGREP: (ARL) query and conversion tool for internet string files (istr),” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   John WittKamper, Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “FTALK: Interrogator tool to identify most frequent conversation endpoints per sensor, per time-period,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   John WittKamper, Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “FTAIL: Interrogator tool to open and follow a log-file,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   John WittKamper, Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “DLYZER: Interrogator tool to identify DNS related flicker-hosts,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   John WittKamper, Steve Hutchinson, Jovina Allen, Robert F. Erbacher, “DIRMOND: Sensor or server tool to monitor a directory and respond to events,” U.S. Army Research Laboratory, Technical Note #In Press,Adelphi, MD, May 2016.

·   Robert F. Erbacher and Steve Hutchinson, “Building on the Scientific Foundations Underlying Cyber Semantics,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   Robert F. Erbacher, Steve Hutchinson, Chris Garneau, John Yen, Peng Liu, Coty Gonzalez, “Collaborative Project: ARSCA-Facilitated Training Procedures for Network Security Analysts,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   Chris Garneau, Robert F. Erbacher, Renee Etoty, “Evaluation of Visualization Tools for Computer Network Defense Analysts: Display Design, Methods, and Results for a User Study,” U.S. Army Research Laboratory,Technical Note #In PressAdelphi, MD, May 2016.

·   Greg Shearer and Robert F. Erbacher, “Evaluation of Visualization Tools for Computer Network Defense Analysts: Display Design, Methods, and Results for a User Study,” U.S. Army Research Laboratory, Technical Note #In PressAdelphi, MD, May 2016.

·   Renée E. Etoty and Robert F. Erbacher, “Science, Technology, Engineering, and Mathematics (STEM) Education Reform to Enhance Security of the Global Cyberspace,” U.S. Army Research Laboratory, Technical Report #ARL-TR-6951, Adelphi, MD, May 2014.

·   Renée E. Etoty, Robert F. Erbacher, Steve Hutchinson, Richard Astrom, Garrett Payer, Raymond Chang, “CyFall: A Cyber-Network Game Scenario,” U.S. Army Research Laboratory, Technical Report #ARL-TR-7024, Adelphi, MD, August  2014.

·   Renée E. Etoty and Robert F. Erbacher, “A Survey of Visualization Tools Assessed for Anomaly-Based Intrusion Detection Analysis,” U.S. Army Research Laboratory, Technical Report #ARL-TR-6891, Adelphi, MD, April 2014.

·   Robert F. Erbacher, Rodrigo Mendoza, Chuck Smith, Carlos Mateo, and Kin Wong, “Interrogator vs. INVA/DE,” DSI Final Report, U.S. Army Research Laboratory, Technical Report #ARL-TR-6890, Adelphi, MD, April 2014.

·   Robert F. Erbacher and Robinson Pino, “Open Source Software Tools for Anomaly Detection Analysis,” U.S. Army Research Laboratory, Memorandum Report #ARL-MR-0869, Adelphi, MD, April 2014.

·   Renée E. Etoty, Dr. Robert F. Erbacher, and Dr. Christopher Garneau, “Evaluation of the Presentation of Network Data via Visualization Tools for Network Analysts,” U.S. Army Research Laboratory, Technical Report #ARL-TR-6865, Adelphi, MD, March 2014.

·   Peng Liu, Robert Erbacher, William Glodek, Renée E. Etoty, and John Yen, “Human Subject Research Protocol: Computer-Aided Human Centric Cyber Situation Awareness: Understanding Cognitive Processes of Cyber Analysts,” U.S. Army Research Laboratory, Technical Report #ARL-TR-6731, Adelphi, MD, November 2013.

·   Robert Erbacher, “Saliency as a Quantitative Validation Mechanism for Visualization Techniques,” U.S. Army Research Laboratory, Technical Report #ARL-TR-6094, Adelphi, MD, 9/2011.

·   Robert Erbacher, Steve E. Hutchinson, Jonathan Katz, “Network Understanding -extension to behaviors,” Technical Report, Army Research Laboratory, Adelphi, MD, 9/2011.

·   Robert F. Erbacher, Steve E. Hutchinson, “Extending Case-Based Reasoning (CBR) Approaches to Semi-Automated Network Alert Reporting,” Technical Report #ARL-TR-6410 April 2013, Army Research Laboratory, Adelphi, MD, 9/2011.

·   RB Whitaker and Dr. Robert F. Erbacher, “AdviseAid Developer Documentation,” Technical Report #erb-2009-001, Department of Computer Science, Utah State University, Logan, UT, 84322, December 26, 2009.

·   Robert F. Erbacher, “Visual Situational Awareness for Vulnerability and Impact Assessment,” AFRL Final Report, Final Report number in DTIC AFRL-RI-RS-TR-2008-269, C Distribution Restrictions, October 2008.

·   Robert F. Erbacher, “2004 AFRL Summer Faculty Research Program Final Report,” Technical Report #2005-1.1, Utah State University, Department of Computer Science, 2005.

·   Robert F. Erbacher, “Computer Forensics: Training and Education,” Technical Report #: SUNYA-CS-02-02 University at Albany, Computer Science Department, December 2002.

·   Robert F. Erbacher, “Implementing an Interactive Visualization System on a SIMD Architecture,” University of Massachusetts at Lowell Technical Report, Lowell, MA 01854, 1996.

·   David A. Southard and Robert F. Erbacher, “Rapid Modeling for Ground Mission Visual Simulation,” Technical Report #: 96B0000111, The MITRE Corporation, Bedford, MA, May 1996.

·   Hugh C. Masterman, Robert F. Erbacher, and Laura R. Ricci, “Suitability of COTS Products for Air Defense Systems,” Technical Report #: WP 96B0000078, The MITRE Corporation, Bedford, MA, July 1996.

·   D. A. Southard, R. F. Erbacher, S. G. Tammaro, and G. Spitz. “Exploitation of Virtual Environment Technology,”Technical Report #: MTR 95B49, The MITRE Corporation, Bedford, MA, March 1995.

 

Other Publications (Including Invited Papers, Refereed Posters, Refereed Position Statements, RefereedAbstracts, and White Papers):

·   Chirs Garneau and Robert F. Erbacher, “Human Factors Research on Displays for Cyber Security Network Analysts,” Unrefereed Poster, ARL External TAB Review, 6/2015.

·   Noam Ben-Asher, Alessandro Oltramari, Coty Gonzalez, Robert F. Erbacher, “Cognitive models and knowledge-based technologies for detection of cyber attacks,” Unrefereed Poster, Cyber CRA Bootrcamp, 5/2015.

·   Robert F. Erbacher, “Internet of Things 2025,” Position Statement for NSF SaTC 2025 Workshop, April 2014.

·   Robert F. Erbacher, “Quantitative Assessment Algorithms for Intrusion Detection,” Unrefereed Poster, ARL External TAB Review, 6/2012.

·   Steve Hutchinson and Robert F. Erbacher, “Distributed Sensor Objects for Intrusion Detection Systems,” Unrefereed Poster, ARL External TAB Review, 6/2012.

·   Robert F. Erbacher, “Foundations of Intrusion Detection,” Unrefereed Poster, ARL Science Day, 4/2012

·   Carol Ellis, Robert F. Erbacher, Steve Hutchinson, Jonathan Katz, “Interrogator:2i Projects in Detection and Evidence Fusion,” Unrefereed Poster, ARL External TAB Review, 6/2011

·   Sidney C. Smith, Hasan Cam, Robert F. Erbacher, “ARL Dataset for NIDS Evaluation 6.1,” Unrefereed Poster, ARL External TAB Review, 6/2011

·   Sidney C. Smith, Rodrigo Mendoza, Hasan Cam, Robert F. Erbacher, “Adversarial dynamics,” Unrefereed Poster, ARL External TAB Review, 6/2011

·   Robert F. Erbacher, Steve Hutchinson, Joshua Edwards, “Web Profiling and Characterization,” Unrefereed Poster, ARL External TAB Review, 6/2011

·   Robert F. Erbacher, “General Chair Introduction,” Proceedings of the 5th IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, May 2010, pp. vii.

·   Robert F. Erbacher, “General Chair Introduction,” Proceedings of the 4th IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, May 2009, pp. vi.

·   Steena Monteiro and Robert F. Erbacher, “An Authentication and Validation Mechanism for Analyzing Syslogs Forensically,” ACM Student Research Competition, Richard Tapia Celebration of Diversity in Computing Conference, Portland, OR, April 1-4, 2009.

·   Steena Monteiro and Robert F. Erbacher, “An Authentication and Validation Mechanism for Analyzing Syslogs Forensically,” SRC Poster Competition, Grace Hopper Conference, Denver, CO, October 1-4, 2008.

·   Anupama Biswas and Robert F. Erbacher, “Impact Analysis of System and Network Attacks using Artificial Neural Networks,” SRC Poster Competition, Grace Hopper Conference, Denver, CO, October 1-4, 2008.

·   Robert F. Erbacher, Barbara Endicott-Popovsky, and Deborah A. Frincke, “Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution,” Proceedings of the 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering, Seattle, WA, April 2007, pp. 150-151. Refereed Challenge Paper.

·   Robert F. Erbacher, “Panel Position Statement: The Future of CMV,” Proceedings of IV07: 11th International Conference Information Visualization, Zurich, Switzerland, July 2007, pp. 75. Refereed Panel Position Statement.

·   Steena Monteiro and Robert F. Erbacher, “An Authentication and Validation Mechanism for Analyzing Syslogs Forensically,” Poster, Grace Hopper Conference, Orlando, FL, October 17-20, 2007.

·   Sarah Moody and Robert F. Erbacher, “SÁDI – Statistical Analysis for Data type Identification,” Poster, Grace Hopper Conference, Orlando, FL, October 17-20, 2007.

·   Robert F. Erbacher, “Visualization Techniques for Situational Awareness,” Contributing author for report on Cyber Research and Capabilities for the Secretary of Defense, Editor: Jim Kadtke, National Defense University, 2007.

·   Robert F. Erbacher, Jonathan C. Roberts, Matti T. Grohn, and Katy Borner, “Chair Introduction,” Proceedings of the SPIE Conference on Visualization and Data Analysis 2006, San Jose, CA, January 2006, pp. ix-x.

·   Robert F. Erbacher, “Extending Command and Control Infrastructures to Cyber Warfare Assets,” IEEE Information Assurance Workshop, West Point, NY June 2005, pp. 446-447. Refereed Poster Paper.

·   Robert F. Erbacher, Philip C. Chen, Jonathan C. Roberts, Matti T. Grohn, and Katy Borner, “Chair Introduction,”Proceedings of the SPIE Conference on Visualization and Data Analysis 2004, San Jose, CA, January 2004, pp. ix-x.

·   Juergen Symanzik, Palyne Gaenir, Robert Erbacher, and Natascha Vukasinovic, “On the Effect of the Ordering of Questions on Exam Scores,” Proceedings of the 2004 ASA Joint Statistical Meetings, Toronto, Canada, August 8-12, 2004. Refereed Abstract.

·   Robert F. Erbacher, Philip C. Chen, Jonathan C. Roberts, Matti T. Grohn, and Katy Borner, “Chair Introduction,”Proceedings of the SPIE Conference on Visualization and Data Analysis 2003, San Jose, CA, January 2003, pp. ix.

·   Robert F. Erbacher, Philip C. Chen, Jonathan C. Roberts, Craig M. Wittenbrink, and Matti Grohn, “Chair Introduction,” Proceedings of the SPIE Conference on Visual Data Exploration and Analysis VIII, San Jose, CA, January 2001, pp. ix.

·   Robert F. Erbacher, “Chair Introduction,” Proceedings of the SPIE Conference on Visual Data Exploration and Analysis VII, San Jose, CA, January 2000, pp. ix.

·   Robert F. Erbacher and Alex Pang, “Chair Introduction,” Proceedings of the SPIE Conference on Visual Data Exploration and Analysis V, San Jose, CA, January 1998, pp. ix.

·   Robert F. Erbacher, “Visual Assistance for Concurrent Processing,” University of Massachusetts at Lowell Doctoral Dissertation (1998 CS-3), Lowell, MA 01854.

·   Robert F. Erbacher, “Chair Introduction,” Proceedings of the SPIE Conference on Visual Data Exploration and Analysis IV, San Jose, CA, January 1997, pp. ix.

·   Robert F. Erbacher, “Increasing Usage of 3D Graphics by the Masses,” Position Paper for the Workshop on PC-Based Graphics, IEEE Visualization ‘97, Phoenix, AZ, 1997.

·   Georges G. Grinstein and Robert F. Erbacher, “Chair Introduction,” Proceedings of the SPIE Conference onVisual Data Exploration and Analysis III, San Jose, CA, January 1996, pp. ix.

·   Georges G. Grinstein and Robert F. Erbacher, “Chair Introduction,” Proceedings of the SPIE Conference onVisual Data Exploration and Analysis II, San Jose, CA, January 1995, pp. 3-4.

                                                 

Books and Proceedings:

·   Cyber Defense and Situational Awareness, Editors: Alexander Kott, Cliff Wang, Robert F. Erbacher, Advances in Information Security 62, Springer 2014.

·   Proceedings of the IEEE Visualization Workshop on Visualization for Computer Security (VizSec) 2009 Workshop, Editors: Deborah A. Frincke, Carrie Gates, John Goodall, Robert F. Erbacher, Atlantic City, NJ, 2009.

·   Proceedings of the SPIE Conference on Visualization and Data Analysis 2006, Editors: Robert F. Erbacher, Jonathan C. Roberts , Matti Grohn, Katy Borner, San Jose, CA, 2006.

·   Proceedings of the SPIE Conference on Visualization and Data Analysis 2005, Editors: Robert F. Erbacher, Jonathan C. Roberts , Matti Grohn, Katy Borner, San Jose, CA, 2005.

·   Proceedings of the SPIE Conference on Visualization and Data Analysis 2004, Editors: Robert F. Erbacher, Philip C. Chen, Jonathan C. Roberts , Matti Grohn, Katy Borner, San Jose, CA, 2004.

·   Proceedings of the SPIE Conference on Visualization and Data Analysis 2003, Editors: Robert F. Erbacher, Philip C. Chen, Jonathan C. Roberts , Matti Grohn, Katy Borner, Santa Clara, CA, 2003.

·   Proceedings of the SPIE Conference on Visualization and Data Analysis 2002, Editors: Robert F. Erbacher, Philip C. Chen, Matti Grohn, Jonathan C. Roberts, Craig M. Wittenbrink, San Jose, CA, 2002.

·   Proceedings of the SPIE Conference on Visual Data Exploration and Analysis VIII, Editors: Robert F. Erbacher, Philip C. Chen, Jonathan C. Roberts, Craig M. Wittenbrink, Matti Grohn, San Jose, CA, 2001.

·   Proceedings of the SPIE Conference on Visual Data Exploration and Analysis VII, Editors: Robert F. Erbacher, Philip C. Chen, Jonathan C. Roberts, Craig M. Wittenbrink, San Jose, CA, 2000.

·   Proceedings of the SPIE Conference on Visual Data Exploration and Analysis VI, Editors: Robert F. Erbacher, Philip C. Chen, Craig M. Wittenbrink, San Jose, CA, 1999.

·   Proceedings of the SPIE Conference on Visual Data Exploration and Analysis V, Editors: Robert F. Erbacher and Alex Pang, San Jose, CA, 1998.

·   Proceedings of the SPIE Conference on Visual Data Exploration and Analysis IV, Editors: Georges G. Grinstein and Robert F. Erbacher, San Jose, CA, 1997.

·   Proceedings of the SPIE Conference on Visual Data Exploration and Analysis III, Editors: Georges G. Grinstein and Robert F. Erbacher, San Jose, CA, 1996.

·   Proceedings of the International Conference on Imaging Science, Systems, and Technology, Editor: H. R. Arabnia, Associate Editors: R. F. Erbacher, X. He, C. Knight, B. Kovalerchuk, M. M-O. Lee, Y. Min, M. Sarfraz, J. Schqing, M. H. N. Tabrizi, Las Vegas, NV, 2001.

.