Developing an ontology for cyber security knowledge graphs M Iannacone, S Bohn, G Nakamura, J Gerth, K Huffer, R Bridges, ... Proceedings of the 10th annual cyber and information security research …, 2015 | 211 | 2015 |
A survey of intrusion detection systems leveraging host data RA Bridges, TR Glass-Vanderlan, MD Iannacone, MS Vincent, Q Chen ACM computing surveys (CSUR) 52 (6), 1-35, 2019 | 151 | 2019 |
Automatic labeling for entity extraction in cyber security RA Bridges, CL Jones, MD Iannacone, KM Testa, JR Goodall arXiv preprint arXiv:1308.4941, 2013 | 140 | 2013 |
Addressing the Lack of Comparability & Testing in CAN Intrusion Detection Research ME Verma, MD Iannacone, RA Bridges, SC Hollifield, P Moriano, B Kay, ... IEEE Transactions on Vehicular Technology, 2021 | 114* | 2021 |
Real-time detection and classification of anomalous events in streaming data EM Ferragut, JR Goodall, MD Iannacone, JA Laska, LT Harrison US Patent 9,319,421, 2016 | 68 | 2016 |
Pace: Pattern accurate computationally efficient bootstrapping for timely discovery of cyber-security concepts N McNeil, RA Bridges, MD Iannacone, B Czejdo, N Perez, JR Goodall 2013 12th International Conference on Machine Learning and Applications 2, 60-65, 2013 | 57 | 2013 |
Graphprints: Towards a graph analytic method for network anomaly detection CR Harshaw, RA Bridges, MD Iannacone, JW Reed, JR Goodall Proceedings of the 11th Annual Cyber and Information Security Research …, 2016 | 50 | 2016 |
CAN-D: A modular four-step pipeline for comprehensively decoding controller area network data ME Verma, RA Bridges, JJ Sosnowski, SC Hollifield, MD Iannacone IEEE Transactions on Vehicular Technology 70 (10), 9685-9700, 2021 | 47 | 2021 |
Nv: Nessus vulnerability visualization for the web L Harrison, R Spahn, M Iannacone, E Downing, JR Goodall Proceedings of the ninth international symposium on visualization for cyber …, 2012 | 45 | 2012 |
Cybersecurity automated information extraction techniques: Drawbacks of current methods, and enhanced extractors RA Bridges, KMT Huffer, CL Jones, MD Iannacone, JR Goodall 2017 16th IEEE international conference on machine learning and applications …, 2017 | 28 | 2017 |
Time-Based CAN Intrusion Detection Benchmark DH Blevins, P Moriano, RA Bridges, ME Verma, MD Iannacone, ... Workshop on Automotive and Autonomous Vehicle Security (AutoSec), 2021 | 25 | 2021 |
Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach MD Iannacone, RA Bridges Computers & Security 96, 101907, 2020 | 24 | 2020 |
How do information security workers use host data? a summary of interviews with security analysts RA Bridges, MD Iannacone, JR Goodall, JM Beaver arXiv preprint arXiv:1812.02867, 2018 | 14 | 2018 |
Detecting CAN Masquerade Attacks with Signal Clustering Similarity P Moriano Salazar, R Bridges, M Iannacone Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States), 2022 | 13* | 2022 |
situ: Situational understanding and discovery for cyber attacks L Harrison, J Laska, R Spahn, M Iannacone, E Downing, EM Ferragut, ... 2012 IEEE Conference on Visual Analytics Science and Technology (VAST), 307-308, 2012 | 13 | 2012 |
Beyond the hype: A real-world evaluation of the impact and cost of machine learning-based malware detection RA Bridges, S Oesch, ME Verma, MD Iannacone, KMT Huffer, B Jewell, ... arXiv preprint arXiv:2012.09214, 2020 | 11 | 2020 |
Integration of external data sources with cyber security data warehouse BD Czejdo, MD Iannacone, RA Bridges, EM Ferragut, JR Goodall Proceedings of the 9th Annual Cyber and Information Security Research …, 2014 | 7 | 2014 |
Stealthy cyber anomaly detection on large noisy multi-material 3d printer datasets using probabilistic models S Yoginath, M Iannacone, V Tansakul, A Passian, R Jordan, J Asiamah, ... Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D …, 2022 | 5 | 2022 |
Universally applicable signal-based controller area network (can) intrusion detection system RA Bridges, KE Verma, M Iannacone, SC Hollifield, P Moriano, ... US Patent App. 17/725,774, 2022 | 4 | 2022 |
Automatic labeling for entity extraction in cyber security. arXiv 2013 RA Bridges, CL Jones, MD Iannacone, KM Testa, JR Goodall arXiv preprint arXiv:1308.4941, 0 | 4 | |