Center for Discrete Mathematics and Theoretical Computer Science (DIMACS)

Fingerprint The fingerprint is based on mining the text of the scientific documents related to the associated persons. Based on that an index of weighted terms is created, which defines the key subjects of research unit

Competition Graph Mathematics
Graph in graph theory Mathematics
Coloring Engineering & Materials Science
Privacy Preserving Mathematics
Competition number Mathematics
Colouring Mathematics
Decision trees Engineering & Materials Science
Vertex of a graph Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2007 2020

Finance
Supply chains
Learning systems
Logistics
Momentum
mathematics
engineering
planning
science
learning

Research Output 1974 2019

A case study in tailoring a bio-inspired cyber-security algorithm: Designing anomaly detection for multilayer networks

Suárez, G. P., Gallos, L. & Fefferman, N. H., Jan 1 2019, In : Journal of Cyber Security and Mobility. 8, 1, p. 113-132 20 p.

Research output: Contribution to journalArticle

Multilayers
Network protocols
Network layers
Denial-of-service attack

Living-learning community for women in computer science at Rutgers

Wright, R., Nadler, S. J., Nguyen, T., Sanchez Gomez, C. N. & Wright, H. M., Feb 22 2019, SIGCSE 2019 - Proceedings of the 50th ACM Technical Symposium on Computer Science Education. Association for Computing Machinery, Inc, p. 286-292 7 p. (SIGCSE 2019 - Proceedings of the 50th ACM Technical Symposium on Computer Science Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

computer science
Computer science
learning
community
Group

A case study in tailoring a bio-inspired cyber-security algorithm: Designing anomaly detection for multilayer networks

Suárez, G., Gallos, L. & Fefferman, N. H., Aug 2 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018. Institute of Electrical and Electronics Engineers Inc., p. 281-286 6 p. 8424661

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multilayers
Network protocols
Network layers
Denial-of-service attack