Dr. Robert F. Erbacher
Computer Scientist at U.S. Army Research Lab
SPIE Involvement:
Conference Program Committee | Conference Chair | Author | Instructor
Publications (28)

Proc. SPIE. 9458, Cyber Sensing 2015
KEYWORDS: Internet, Network security, Computing systems, Systems modeling, Analytical research, Inspection, Defense and security, Information security, Sensors, Computer security

PROCEEDINGS ARTICLE | January 24, 2011
Proc. SPIE. 7868, Visualization and Data Analysis 2011
KEYWORDS: Visualization, Computer intrusion detection, Visual analytics, Network security, Computing systems, Data processing, Data modeling, Computer security, Visual process modeling, Computer networks

PROCEEDINGS ARTICLE | January 18, 2010
Proc. SPIE. 7530, Visualization and Data Analysis 2010
KEYWORDS: Visualization, Visual analytics, Network security, Situational awareness sensors, Analytical research, Forensic science, Data communications, Visual process modeling, Artillery, Data analysis

PROCEEDINGS ARTICLE | January 28, 2008
Proc. SPIE. 6809, Visualization and Data Analysis 2008
KEYWORDS: Visualization, Visual analytics, Legal, Forensic science, Digital forensics, Analytical research, Network security, Feedback loops, Statistical analysis, Binary data

SPIE Conference Volume | January 28, 2007

SPIE Conference Volume | January 15, 2006

Showing 5 of 28 publications
Conference Committee Involvement (16)
Visualization and Data Analysis 2010
18 January 2010 | San Jose, California, United States
Visualization and Data Analysis 2009
19 January 2009 | San Jose, California, United States
Visualization and Data Analysis 2008
28 January 2008 | San Jose, California, United States
Visualization and Data Analysis 2007
29 January 2007 | San Jose, CA, United States
Visualization and Data Analysis 2006
16 January 2006 | San Jose, California, United States
Showing 5 of 16 published special sections
Course Instructor
SC525: Introduction to Information Assurance: How Secure is Your Data?
Network connectivity has become ubiquitous and with it come concerns for the security and privacy of the associated computer and network infrastructure. Given the criticality of data communicated over networks and stored on networked systems, ensuring that the data is not compromised is vital. Understanding the fundamentals of computer security is necessary for an organization to protect such confidential data. This course will touch on various aspects of computer security, including: Host-Based Security, Network-Based Security, Encryption, Intrusion and Misuse Detection, Computer Forensics, and Legal Issues.
  • View contact details

Is this your profile? Update it now.
Don’t have a profile and want one?

Back to Top