Unmanned aerial vehicle security using recursive parameter estimation Z Birnbaum, A Dolgikh, V Skormin, E O’Brien, D Muller, C Stracquodaine Journal of Intelligent & Robotic Systems 84, 107-120, 2016 | 107 | 2016 |
Unmanned aerial vehicle security using behavioral profiling Z Birnbaum, A Dolgikh, V Skormin, E O'Brien, D Muller, C Stracquodaine 2015 International conference on unmanned aircraft systems (ICUAS), 1310-1319, 2015 | 67 | 2015 |
Expressive, efficient and obfuscation resilient behavior based IDS AG Tokhtabayev, VA Skormin, AM Dolgikh European Symposium on Research in Computer Security, 698-715, 2010 | 30 | 2010 |
Industrial control systems security testbed E Korkmaz, A Dolgikh, M Davis, V Skormin 11th Annual Symposium on Information Assurance, 13-18, 2016 | 29 | 2016 |
ICS security testbed with delay attack case study E Korkmaz, A Dolgikh, M Davis, V Skormin MILCOM 2016-2016 IEEE Military Communications Conference, 283-288, 2016 | 23 | 2016 |
Detection and mitigation of time delay injection attacks on industrial control systems with PLCs E Korkmaz, M Davis, A Dolgikh, V Skormin Computer Network Security: 7th International Conference on Mathematical …, 2017 | 17 | 2017 |
Unmanned Aerial System security using real-time autopilot software analysis C Stracquodaine, A Dolgikh, M Davis, V Skormin 2016 International Conference on Unmanned Aircraft Systems (ICUAS), 830-839, 2016 | 17 | 2016 |
Cloud security auditing based on behavioral modeling Z Birnbaum, B Liu, A Dolgikh, Y Chen, V Skormin 2013 IEEE Ninth World Congress on Services, 268-273, 2013 | 17 | 2013 |
Using behavioral modeling and customized normalcy profiles as protection against targeted cyber-attacks A Dolgikh, T Nykodym, V Skormin, Z Birnbaum International Conference on Mathematical Methods, Models, and Architectures …, 2012 | 17 | 2012 |
Colored Petri nets as the enabling technology in intrusion detection systems A Dolgikh, T Nykodym, V Skormin, J Antonakos, M Baimukhamedov 2011-MILCOM 2011 Military Communications Conference, 1297-1301, 2011 | 16 | 2011 |
Behavioral modeling for suspicious process detection in cloud computing environments A Dolgikh, Z Birnbaum, Y Chen, V Skormin 2013 IEEE 14th International Conference on Mobile Data Management 2, 177-181, 2013 | 12 | 2013 |
Detection of worm propagation engines in the system call domain using colored petri nets AG Tokhtabayev, VA Skormin, AM Dolgikh 2008 IEEE International Performance, Computing and Communications Conference …, 2008 | 11 | 2008 |
Dynamic, resilient detection of complex malicious functionalities in the system call domain A Tokhtabayev, V Skormin, A Dolgikh 2010-MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 1349-1356, 2010 | 9 | 2010 |
The behavioral approach to diagnostics of cyber-physical systems V Skormin, A Dolgikh, Z Birnbaum 2014 IEEE AUTOTEST, 26-30, 2014 | 8 | 2014 |
Computer network testbed at binghamton university A Dolgikh, T Nykodym, V Skormin, J Antonakos 2011-MILCOM 2011 Military Communications Conference, 1146-1151, 2011 | 7 | 2011 |
Resident security system for government/industry owned computers M Davis, E Korkmaz, A Dolgikh, V Skormin Computer Network Security: 7th International Conference on Mathematical …, 2017 | 6 | 2017 |
Cloud security auditing based on behavioural modelling A Dolgikh, Z Birnbaum, B Liu, Y Chen, V Skormin International Journal of Business Process Integration and Management 7 (2 …, 2014 | 6 | 2014 |
Automatic functionality detection in behavior-based ids T Nykodym, V Skormin, A Dolgikh, J Antonakos 2011-MILCOM 2011 Military Communications Conference, 1302-1307, 2011 | 6 | 2011 |
Customized behavioral normalcy profiles for critical infrastructure protection A Dolgikh, Z Birnbaum, V Skormin 8th Annual Symposium on Information Assurance (ASIA 2013), Albany, NY, 15-22, 2013 | 4 | 2013 |
Behavior based approach for intrusion detection systems A Dolgikh State University of New York at Binghamton, 2013 | 4 | 2013 |