Dr. Robert F. Erbacher
Computer Scientist at U.S. Army Research Lab
SPIE Involvement:
Conference Program Committee | Conference Chair | Author | Instructor
Publications (28)

PROCEEDINGS ARTICLE | May 14, 2015
Proc. SPIE. 9458, Cyber Sensing 2015
KEYWORDS: Defense and security, Internet, Sensors, Inspection, Computing systems, Analytical research, Systems modeling, Information security, Computer security, Network security

PROCEEDINGS ARTICLE | January 24, 2011
Proc. SPIE. 7868, Visualization and Data Analysis 2011
KEYWORDS: Visual process modeling, Visual analytics, Data modeling, Visualization, Computing systems, Data processing, Computer networks, Computer intrusion detection, Computer security, Network security

PROCEEDINGS ARTICLE | January 18, 2010
Proc. SPIE. 7530, Visualization and Data Analysis 2010
KEYWORDS: Visual process modeling, Visual analytics, Visualization, Forensic science, Analytical research, Data communications, Artillery, Network security, Situational awareness sensors, Data analysis

PROCEEDINGS ARTICLE | January 28, 2008
Proc. SPIE. 6809, Visualization and Data Analysis 2008
KEYWORDS: Statistical analysis, Visual analytics, Visualization, Forensic science, Legal, Feedback loops, Analytical research, Binary data, Network security, Digital forensics

SPIE Conference Volume | January 28, 2007

SPIE Conference Volume | January 15, 2006

Showing 5 of 28 publications
Conference Committee Involvement (16)
Visualization and Data Analysis 2010
18 January 2010 | San Jose, California, United States
Visualization and Data Analysis 2009
19 January 2009 | San Jose, California, United States
Visualization and Data Analysis 2008
28 January 2008 | San Jose, California, United States
Visualization and Data Analysis 2007
29 January 2007 | San Jose, CA, United States
Visualization and Data Analysis 2006
16 January 2006 | San Jose, California, United States
Showing 5 of 16 published special sections
Course Instructor
SC525: Introduction to Information Assurance: How Secure is Your Data?
Network connectivity has become ubiquitous and with it come concerns for the security and privacy of the associated computer and network infrastructure. Given the criticality of data communicated over networks and stored on networked systems, ensuring that the data is not compromised is vital. Understanding the fundamentals of computer security is necessary for an organization to protect such confidential data. This course will touch on various aspects of computer security, including: Host-Based Security, Network-Based Security, Encryption, Intrusion and Misuse Detection, Computer Forensics, and Legal Issues.
SIGN IN TO:
  • View contact details

UPDATE YOUR PROFILE
Is this your profile? Update it now.
Don’t have a profile and want one?

Back to Top