Urmăriți
Michael Iannacone
Michael Iannacone
Adresă de e-mail confirmată pe ornl.gov
Titlu
Citat de
Citat de
Anul
Developing an ontology for cyber security knowledge graphs
M Iannacone, S Bohn, G Nakamura, J Gerth, K Huffer, R Bridges, ...
Proceedings of the 10th annual cyber and information security research …, 2015
2112015
A survey of intrusion detection systems leveraging host data
RA Bridges, TR Glass-Vanderlan, MD Iannacone, MS Vincent, Q Chen
ACM computing surveys (CSUR) 52 (6), 1-35, 2019
1512019
Automatic labeling for entity extraction in cyber security
RA Bridges, CL Jones, MD Iannacone, KM Testa, JR Goodall
arXiv preprint arXiv:1308.4941, 2013
1402013
Addressing the Lack of Comparability & Testing in CAN Intrusion Detection Research
ME Verma, MD Iannacone, RA Bridges, SC Hollifield, P Moriano, B Kay, ...
IEEE Transactions on Vehicular Technology, 2021
114*2021
Real-time detection and classification of anomalous events in streaming data
EM Ferragut, JR Goodall, MD Iannacone, JA Laska, LT Harrison
US Patent 9,319,421, 2016
682016
Pace: Pattern accurate computationally efficient bootstrapping for timely discovery of cyber-security concepts
N McNeil, RA Bridges, MD Iannacone, B Czejdo, N Perez, JR Goodall
2013 12th International Conference on Machine Learning and Applications 2, 60-65, 2013
572013
Graphprints: Towards a graph analytic method for network anomaly detection
CR Harshaw, RA Bridges, MD Iannacone, JW Reed, JR Goodall
Proceedings of the 11th Annual Cyber and Information Security Research …, 2016
502016
CAN-D: A modular four-step pipeline for comprehensively decoding controller area network data
ME Verma, RA Bridges, JJ Sosnowski, SC Hollifield, MD Iannacone
IEEE Transactions on Vehicular Technology 70 (10), 9685-9700, 2021
472021
Nv: Nessus vulnerability visualization for the web
L Harrison, R Spahn, M Iannacone, E Downing, JR Goodall
Proceedings of the ninth international symposium on visualization for cyber …, 2012
452012
Cybersecurity automated information extraction techniques: Drawbacks of current methods, and enhanced extractors
RA Bridges, KMT Huffer, CL Jones, MD Iannacone, JR Goodall
2017 16th IEEE international conference on machine learning and applications …, 2017
282017
Time-Based CAN Intrusion Detection Benchmark
DH Blevins, P Moriano, RA Bridges, ME Verma, MD Iannacone, ...
Workshop on Automotive and Autonomous Vehicle Security (AutoSec), 2021
252021
Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach
MD Iannacone, RA Bridges
Computers & Security 96, 101907, 2020
242020
How do information security workers use host data? a summary of interviews with security analysts
RA Bridges, MD Iannacone, JR Goodall, JM Beaver
arXiv preprint arXiv:1812.02867, 2018
142018
Detecting CAN Masquerade Attacks with Signal Clustering Similarity
P Moriano Salazar, R Bridges, M Iannacone
Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States), 2022
13*2022
situ: Situational understanding and discovery for cyber attacks
L Harrison, J Laska, R Spahn, M Iannacone, E Downing, EM Ferragut, ...
2012 IEEE Conference on Visual Analytics Science and Technology (VAST), 307-308, 2012
132012
Beyond the hype: A real-world evaluation of the impact and cost of machine learning-based malware detection
RA Bridges, S Oesch, ME Verma, MD Iannacone, KMT Huffer, B Jewell, ...
arXiv preprint arXiv:2012.09214, 2020
112020
Integration of external data sources with cyber security data warehouse
BD Czejdo, MD Iannacone, RA Bridges, EM Ferragut, JR Goodall
Proceedings of the 9th Annual Cyber and Information Security Research …, 2014
72014
Stealthy cyber anomaly detection on large noisy multi-material 3d printer datasets using probabilistic models
S Yoginath, M Iannacone, V Tansakul, A Passian, R Jordan, J Asiamah, ...
Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D …, 2022
52022
Universally applicable signal-based controller area network (can) intrusion detection system
RA Bridges, KE Verma, M Iannacone, SC Hollifield, P Moriano, ...
US Patent App. 17/725,774, 2022
42022
Automatic labeling for entity extraction in cyber security. arXiv 2013
RA Bridges, CL Jones, MD Iannacone, KM Testa, JR Goodall
arXiv preprint arXiv:1308.4941, 0
4
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20