Research methods for cyber security TW Edgar, DO Manz Syngress, 2017 | 466 | 2017 |
Exploratory study TW Edgar, DO Manz Research methods for cyber security 29, 95-130, 2017 | 214 | 2017 |
A communication–computation efficient group key algorithm for large and dynamic groups S Zheng, D Manz, J Alves-Foss Computer Networks 51 (1), 69-93, 2007 | 65 | 2007 |
Chapter 6-machine learning TW Edgar, DO Manz Research methods for cyber security, 153-173, 2017 | 57 | 2017 |
Gamification for measuring cyber security situational awareness G Fink, D Best, D Manz, V Popovsky, B Endicott-Popovsky Foundations of Augmented Cognition: 7th International Conference, AC 2013 …, 2013 | 44 | 2013 |
Science and cyber security TW Edgar, DO Manz Research methods for cyber security, 33-62, 2017 | 43 | 2017 |
PCA: memory leak detection using partial call-path analysis W Li, H Cai, Y Sui, D Manz Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020 | 39 | 2020 |
Design and implementation of a multi-use attack-defend computer security lab S Caltagirone, P Ortman, S Melton, D Manz, K King, P Oman Proceedings of the 39th Annual Hawaii International Conference on System …, 2006 | 24 | 2006 |
Realizing scientific methods for cyber security TE Carroll, D Manz, T Edgar, FL Greitzer Proceedings of the 2012 Workshop on Learning from Authoritative Security …, 2012 | 22 | 2012 |
Towards an experimental testbed facility for cyber-physical security research T Edgar, D Manz, T Carroll Proceedings of the Seventh Annual Workshop on Cyber Security and Information …, 2011 | 22 | 2011 |
Chapter 3—Starting Your Research TW Edgar, DO Manz Research methods for cyber security, 63-92, 2017 | 19 | 2017 |
Applied Experimentation T Edgar, D Manz Research Methods for Cyber Security, 271-297, 2019 | 17 | 2019 |
Convenience sampling TW Edgar, DO Manz Research methods for cyber security, 2017 | 17 | 2017 |
Network simulation of group key management protocols D Manz, J Alves-Foss, S Zheng Journal of Information Assurance and Security 3 (1), 67-79, 2008 | 17 | 2008 |
Chapter 5-descriptive study TW Edgar, DO Manz Research methods for cyber security, 131-151, 2017 | 16 | 2017 |
Research Methods for Cyber Security W Thomas, D Manz Thomas, D. Manz. 1st edition. California: Syngress, 352, 2017 | 15 | 2017 |
Risk-informed autonomous adaptive cyber controllers A Veeramany, WJ Hutton III, S Sridhar, SNG Gourisetti, GA Coles, MJ Rice, ... US Patent 11,206,278, 2021 | 12 | 2021 |
Security and performance of group key agreement protocols S Zheng, D Manz, J Alves-Foss, Y Chen IASTED International Conference on Networks and Communication Systems, 321-327, 2006 | 10 | 2006 |
A cyber secure communication architecture for multi-site hardware_in_the_loop Co_simulation of DER control SNG Gourisetti, J Hansen, W Hofer, D Manz, K Kalsi, J Fuller, S Niddodi, ... 2018 Resilience Week (RWS), 55-62, 2018 | 9 | 2018 |
Reverse engineering integrated circuits using finite state machine analysis J Smith, K Oler, C Miller, D Manz | 9 | 2017 |