Fuzzy data mining and genetic algorithms applied to intrusion detection SM Bridges, RB Vaughn Proceedings of 12th annual Canadian information technology security …, 2000 | 440 | 2000 |
Information assurance measures and metrics-state of practice and proposed taxonomy RB Vaughn, R Henning, A Siraj 36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003 | 210 | 2003 |
Overview of the Mars Pathfinder Mission: Launch through landing, surface operations, data sets, and science results MP Golombek, RC Anderson, JR Barnes, JF Bell III, NT Bridges, DT Britt, ... Journal of Geophysical Research: Planets 104 (E4), 8523-8553, 1999 | 179 | 1999 |
A retrofit network intrusion detection system for MODBUS RTU and ASCII industrial control systems T Morris, R Vaughn, Y Dandass 2012 45th Hawaii International Conference on System Sciences, 2338-2345, 2012 | 176 | 2012 |
Fuzzy cognitive maps for decision support in an intelligent intrusion detection system A Siraj, SM Bridges, RB Vaughn Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International …, 2001 | 173 | 2001 |
An improved algorithm for fuzzy data mining for intrusion detection G Florez, SA Bridges, RB Vaughn 2002 Annual Meeting of the North American Fuzzy Information Processing …, 2002 | 156 | 2002 |
Intrusion detection via fuzzy data mining SM Bridges, RB Vaughn 12th Annual Canadian Information Technology Security Symposium, 109-122, 2000 | 117 | 2000 |
Cluster security research involving the modeling of network exploitations using exploitation graphs W Li, RB Vaughn Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID …, 2006 | 111 | 2006 |
Deterministic intrusion detection rules for MODBUS protocols TH Morris, BA Jones, RB Vaughn, YS Dandass 2013 46th Hawaii International Conference on System Sciences, 1773-1781, 2013 | 97 | 2013 |
A testbed for SCADA control system cybersecurity research and pedagogy T Morris, R Vaughn, YS Dandass Proceedings of the Seventh Annual Workshop on Cyber Security and Information …, 2011 | 91 | 2011 |
Phighting the phisher: Using web bugs and honeytokens to investigate the source of phishing attacks CM McRae, RB Vaughn 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 86 | 2007 |
Intrusion sensor data fusion in an intelligent intrusion detection system architecture A Siraj, RB Vaughn, SM Bridges 37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004 | 82 | 2004 |
Engineering future cyber-physical energy systems: Challenges, research needs, and roadmap TH Morris, AK Srivastava, B Reaves, K Pavurapu, S Abdelwahed, ... 41st North American power symposium, 1-6, 2009 | 74 | 2009 |
Information system security compliance to FISMA standard: a quantitative measure E Hulitt, RB Vaughn Telecommunication Systems 45, 139-152, 2010 | 69 | 2010 |
Combining static analysis and dynamic learning to build accurate intrusion detection models Z Liu, SM Bridges, RB Vaughn Third IEEE International Workshop on Information Assurance (IWIA'05), 164-177, 2005 | 61 | 2005 |
An empirical study of industrial security-engineering practices RB Vaughn Jr, R Henning, K Fox Journal of Systems and software 61 (3), 225-232, 2002 | 59 | 2002 |
Software requirement understanding using Pathfinder networks: Discovering and evaluating mental models UK Kudikyala, RB Vaughn Journal of Systems and Software 74 (1), 101-108, 2005 | 57 | 2005 |
Adaptive intrusion detection with data mining M Hossain, SM Bridges, RB Vaughn SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems …, 2003 | 57 | 2003 |
Building an information security education program RB Vaughn, DA Dampier, MB Warkentin Proceedings of the 1st annual conference on Information security curriculum …, 2004 | 54 | 2004 |
An approach to model network exploitations using exploitation graphs W Li, RB Vaughn, YS Dandass Simulation 82 (8), 523-541, 2006 | 53 | 2006 |