Year | Title | |
---|---|---|
2023 | Modeling Internet-of-Things (IoT) Behavior for Enforcing Security and Privacy Po | Authors: Parth Ganeriwala - Anubhav Gupta - Daniel Campos - Siddharta Bhattacharyya - TJ OConnor - Adolf Dcosta |
2023 | Toward a Labeled Dataset of IoT Malware Features | Authors: Stian Olsen - TJ OConnor |
2023 | Towards Examining The Security Cost of Inexpensive Smart Home IoT Devices | Authors: TJ OConnor - Dylan Jesse - Daniel Campos |
2023 | Understanding how to diversify the cybersecurity workforce | Authors: Maria Chaparro Osman - Maureen Namukasa - Cherisse Ficke - Isabella Piasecki - TJ Oconnor - Meredith Carroll |
2023 | Compete to Learn: Toward Cybersecurity As A Sport | Authors: TJ OConnor - Dane Brown - Jasmine Jackson - Suzaan Schmeelk - Bryson Payne |
2023 | Evaluation of an Internet of Things Device-based Educational Approach to Engage a More Diverse Cybersurity Workforce | Authors: Maureen Namukasa - Maria Chaparro Osman - Cherrise Ficke - Isabella Piasecki - Meredith Carroll - TJ OConnor |
2023 | Analyzing the Impact of Gender Misclassification on Face Recognition Accuracy | Authors: Afi Edem Edi Gbekevi - Paloma Vela Achu - Gabriella Pangelinan - Michael King - Kevin W. Bowyer |
2023 | Exploring Causes of Demographic Variations In Face Recognition Accuracy | Authors: Gabriella Pangelinan - K.S. Krishnapriya - Vitor Albiero - Grace Bezold - Kai Zhang - Kushal Vangara - Michael C. King - Kevin W. Bowyer |
2022 | Helo darkside: Breaking free from katas and embracing the adversarial mindset in | Author: TJ OConnor |
2022 | Toward an Automatic Exploit Generation Competition for an Undergraduate Binary R | Authors: TJ OConnor - Carl Mann - Tiffanie Petersen - Isaiah Thomas - Chris Stricklan |
2022 | MPO: MQTT-Based Privacy Orchestrator for Smart Home Users | Authors: Ahmed Alhazm - Khulud Alawaji - TJ OConnor |
2022 | Analysis of Manual and Automated Skin Tone Assignments | Authors: K.S. Krishnapriya - Gabriella Pangelinan - Michael King - Kevin W. Bowyer |
2021 | Towards binary diversified challenges for a hands-on reverse engineering course | Authors: Chris Stricklan - TJ OConnor |
2021 | Teaching a hands-on mobile and wireless cybersecurity course | Authors: TJ OConnor - Chris Stricklan |
2021 | Through the spyglass: Toward IoT companion app man-in-the-middle attacks | Authors: TJ OConnor - Dylan Jesse - Daniel Campos |
2021 | Towards labeling on-demand IoT traffic | Authors: Daniel Campos - TJ OConnor |
2021 | A replication study for IoT privacy preferences | Authors: Ahmed Alhazmi - Ghassen Kilani - William Allen - TJ OConnor |
2020 | Analysis of Gender Inequality In Face Recognition Accuracy | Authors: Vitor Albiero - K.S. Krishnapriya - Kushal Vangara - Kai Zhang - Michael C. King - Kevin W. Bowyer |
2020 | Issues Related to Face Recognition Accuracy Varying Based on Race and Skin Tone | Authors: K.S. Krishnapriya, Vitor Albiero - Kushal Vangara - Michael C. King |
2020 | The Criminality From Face Illusion | Authors: Kevin W. Bowyer - Michael King - Walter Scheirer - Kushal Vangara |
2020 | Never ending story: Authentication and access control design flaws in shared IoT | Authors: Blake Janes - Heather Crawford - TJ OConnor |
2020 | A Neurofeedback-Driven Humanoid to support Deep Work | Authors: Troy Weekes - Thomas C. Eskridge |
2019 | Does Face Recognition Accuracy Get Better With Age? Deep Face Matchers Say No | Authors: Vitor Albiero - Kevin W. Bowyer - Kushal Vangara - Michael C. King |
2019 | Characterizing the Variability in Face Recognition Accuracy Relative to Race | Authors: Krishnapriya K.S. - Kushal Vangara - Michael C. King - Vitor Albiero - Kevin Bowyer |
2019 | Towards the application of recommender systems to secure coding | Authors: Marco M. Carvalho - Thomas C. Eskridge - Fitzroy D. Nembhard |
2019 | Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things | Authors: TJ OConnor - William Enck - Bradley Reaves |
2019 | HomeSnitch_ behavior transparency and control for smart home IoT devices | Authors: TJ OConnor - William Enck - Bradley Reaves - Reham Mohamed - Markus Miettinen - Ahmad-Reza Sadeghi |
2019 | The Deployment of RFID Technology on Small Farms in Holopaw, FL: A Community-Centered Effort | Authors: Nembhard, Fitzroy - Carvalho, Marco - Zisis Tegos, Kleanthis |
2018 | Towards An Adaptable System-based Classification Design for Cyber Identity | Authors: Mary (Kay) Michael - Michael King |
2018 | Cyber Identity: Salient Trait Ontology and Computational Framework to Aid in Sol | Authors: Mary (Kay) Michael - Marco Carvalho - Heather Crawford - Albert C. Esterline |
2018 | Categorization of Discoverable Cyber Attributes for Identity Protection, Privacy | Authors: Mary (Kay) Michael - Michael King |
2018 | On the Automation of Cyber Experimentation | Authors: Mehta, Dhanish |
2018 | Models and Framework for Supporting Humanoid RobotPlanning & Exploration | Authors: Hasanain, Ahmad - Weekes, Troy - Person, Michael - Paul, Kepinski |
2018 | PivotWall: SDN-Based Information Flow Control | Authors: TJ OConnor - William Enck - W. Michael Petullo - Akash Verma |
2018 | A hybrid approach to improving program security | Authors: Carvalho, M. - Nembhard, F. - Eskridge, T. |
2018 | Optimal trajectory and schedule planning for autonomous guided vehicles in flexible manufacturing system | Authors: Carvalho, M. - Mahdavi, A. |
2018 | Extracting Knowledge from Open Source Projects to Improve Program Security | Authors: Carvalho, M. - Nembhard, F. - Eskridge, T. |
2018 | Formal assurance for cooperative intelligent autonomous agents | Authors: Carvalho, M. - Eskridge, T.C. - Neogi, N.A. - Stafford, M. - Bhattacharyya, S. |
2018 | FPGA Hardware Implementation of Smart Home Autonomous System Based on Deep Learning | Authors: Allen, William - Daood, Amar I. - Alawad, Mohammed M. - Alhafidh, Basman M. Hasan |
2017 | High fidelity adaptive cyber emulation | Authors: Samir Mammadov - Dhanish Mehta - Evan Stoner - Marco M. Carvalho |
2017 | Malware classification using static analysis based features | Authors: Marco M. Carvalho - Philip K. Chan - Mehadi Hassen |
2017 | Authentication on the Go: Assessing the Effect of Movement on Mobile Device Keystroke Dynamics | Authors: Crawford, Heather - Ahmadzadeh, Ebad |
2017 | Real-Time Server Overloaded Monitoring Algorithm Using Back Propagation Artificial Neural Network | |
2017 | Comparison and Performance Analysis of Machine Learning Algorithms for the Prediction of Human Actions in a Smart Home Environment | Authors: Alhafidh, Basman M. Hasan - Allen, William H. |
2017 | High Level Design of a Home Autonomous System Based on Cyber Physical System Modeling | Authors: Alhafidh, Basman M Hasan - Allen, William H |
2017 | Proactive Approach for the Prevention of DDoS Attacks in Cloud Computing Environments | Authors: Allen, William - Alshehry, Badr |
2017 | The Artificial Memory of Mr. Polly: Memory Simulation in Databases and the Emergence of Knowledge | Authors: Allen, William H - Bahr, Gisela Susanne - Bernhard, Philip J - Wood, Stephen |
2016 | Using Image Saliency and Regions of Interest to Encourage Stronger Graphical Passwords | |
2016 | Ontologies supporting Quantification of Attack Surfaces | Authors: Eskridge, Thomas C - Simidchieva, B - Paltzer, Nicholas - Atighetchi, M |
2016 | User Display Providing Obstacle Avoidance | Authors: Johnson, Matthew - Kenny, Chua Wei Liang - Eskridge, Thomas |
2016 | Formal Verification of Intelligent Decision Procedures Systems Modeled as Decision Procedures | Authors: Bhattacharyya, Siddhartha - Eskrdige Thomas C. - Carvalho, M |
2016 | Verification of Security Response | Authors: Eskrdige Thomas C. - Bhattacharyya, Siddhartha - Carvalho, M |
2016 | Verification of Decision Procedures Modeled in Intelligent Agents | Authors: Carvalho, Marco - Eskridge, Thomas C - Bhattacharyya, S - Davis, J |
2016 | Personal Identity Matching | Authors: Marco Carvalho - Mazin Al-Shuaili |
2016 | An autonomous resiliency toolkit - needs, challenges, and concepts for next generation cyber defense platforms | Authors: M. Carvalho - M. Atighetchi - F. Yaman - B. Simidchieva |
2016 | Character Mapping for Cross-Language | Authors: Carvalho, Marco - Al-Shuaili, Mazin |
2016 | Experimentation support for cyber security evaluations | Authors: Atighetchi, M. - Carvalho, M. - Last, D. - Simidchieva, B. |
2016 | Interactive Visualization of Netflow Traffic | Authors: Carvalho, M. - Eskridge, T.C. - Thotempudi, H. - Nembhard, F. - Polack, P.J. |
2016 | Semi-automated wrapping of defenses (SAWD) for cyber command and control | Authors: Atighetchi, M. - Carvalho, M. - Eskridge, T.C. - Paltzer, C.N. |
2016 | A decision engine for configuration of proactive defenses - Challenges and concepts | Authors: Atighetchi, M. - Last, D. - Eskridge, T.C. - Benyo, B. |
2016 | Using ontologies to quantify attack surfaces | Authors: Atighetchi, M. - Carvalho, M. - Simidchieva, B. - Paltzer, N. - Eskridge, T. - Yaman, F. |
2015 | Motion-resolving hover display | Authors: Eskridge, Thomas C - Temme, Leonard A - Still, David L |
2015 | Resilient Command and Control Infrastructures for Cyber Operations | Authors: Marco Carvalho |
2015 | Poster: Image Suitability for Graphical Passwords | Authors: Alshehri, Mohammad N. - Crawford, Heather - Mayron, Liam M. |
2015 | A significant improvement for anti-malware tests | Authors: Carvalho, M. - Ford, R. |
2015 | Coactive Emergence as a Sensemaking Strategy for Cyber Security Work | Authors: Carvalho, Marco - Forsythe, Chris - Eskridge, Tom - Bradshaw, Jeffrey M - Woods, David D - Hoffman, Robert R - Bunch, Larry - Kidwell, Dan - Johnson, Matt - Feltovich, Paul J |
2015 | MIRA: A support infrastructure for cyber command and control operations | Authors: Carvalho, M. - Eskridge, T.C. - Paltzer, N. - Ferguson-Walter, K. |
2015 | Quantifying minimizing attack surfaces containing moving target defenses | Authors: M. Carvalho - D. Last - J. Loyall - N. Soule - B. Flatley - D. Myers - B. Simidchieva - F. Yaman - M. Atighetchi - R. Watro |
2015 | VINE: A cyber emulation environment for MTD experimentation | Authors: Carvalho, M. - Eskridge, T.C. - Stoner, E. - Toggweiler, T. - Granados, A. |
2015 | VINE | Authors: Evan Stoner - Marco M. Carvalho - Adrian Granados - Thomas C. Eskridge - Troy Toggweiler |
2015 | A comparative study of File-Type Identification Techniques | Authors: Allen, W.H. - Alamri, N.S. |
2015 | Usable-Security Evaluation | Authors: Yasser M. Hausawi - William H. Allen |
2014 | Event data visualization tool | Authors: Bradshaw, Jeffrey M - Feltovich, Paul J - Eskridge, Thomas C - Johnson, Matthew - Bunch, Lawrence K - Carvalho, Marco M |
2014 | Authentication in Mobile and Ubiquitous Computing | Authors: Crawford, Heather |
2014 | Exploring Netfow Data using Hadoop | |
2014 | Efficient spectrum allocation in multiband CSMA networks | Authors: Subramanian, S. - Dixon, W.E. - Pasiliao, E.L. - Carvalho, M.M. - Shea, J.M |
2014 | Empirical models for complex network dynamics: A preliminary study | Authors: Carvalho, M. - Oliveira, D. |
2014 | Heartbleed 101 | Authors: Carvalho, M. - Ford, R. - Wheeler, D.A. - Demott, J. |
2014 | Moving-target defenses for computer networks | Authors: Carvalho, M. - Ford, R. |
2014 | Performance evaluation of static frequency reuse techniques for OFDMA cellular networks | Authors: Carvalho, M.M. - Hambebo, B.M. - Ham, F.M. |
2014 | Protecting me | Authors: Carvalho, M. - Ford, R. |
2014 | Statistical learning approach for robust melanoma screening | Authors: Fornaciali, Michel - Carvalho, Micael - Valle, Eduardo - Avila, Sandra |
2014 | Strategies for spectrum allocation in OFDMA cellular networks | Authors: Carvalho, M. - Hambebo, B.M. - Ham, F. |
2014 | AOA: Ambient obstacle avoidance interface | Authors: Eskridge, T. - Johnson, M. - Keller, B. - Chua, W.L.K. |
2014 | Principles for human-centered interaction design, Part 1: Performative systems | Authors: Eskridge, T.C. - Hoffman, R.R. - Still, D. |
2014 | A taxonomy of file-type identification techniques | Authors: Allen, W.H. - Alamri, N.S. |
2014 | An assessment framework for usable-security based on decision science | Authors: Allen, W.H. - Hausawi, Y.M. |
2014 | Choice-based authentication: A usable-security approach | Authors: Allen, W.H. - Hausawi, Y.M. - Bahr, G.S. |
2014 | RAAODV: A reputation-aware AODV for mobile ad hoc networks | Authors: Allen, W.H. - Al-Hamadani, A. |
2014 | Usablity and security trade-off: A design guideline | Authors: Allen, W.H. - Hausawi, Y.M. |
2014 | Assured Supraliminal Steganography in Computer Games | Authors: John Aycock - Daniel Medeiros Nunes de Castro - Vineet Sinha - Anton Mosunov - Heather Crawford - Rashmi Kumari |
2014 | Invisible, Passive, Continuous and Multimodal Authentication | Authors: Heather Crawford - Karen Renaud |
2014 | Reflections on U-PriSM 2 | Authors: Heather Crawford - Sonia Chiasson - Serge Egelman - Pourang Irani |
2014 | Understanding user perceptions of transparent authentication on a mobile device |
Authors: Heather Crawford - Karen Renaud |
2013 | A framework for continuous, transparent mobile device authentication | Authors: Heather Crawford - Karen Renaud - Tim Storer |
2013 | An effective method for modeling wind power forecast uncertainty | Authors: Mitchell J. Small - Jay Apt - Pedro M. S. Carvalho - Brandon Mauch |
2013 | A Gaming Environment for Resilient Network Design and Adversarial Co-Evolution Modeling | Authors: Carvalho, Marco - Stoner, Evan - McLane, James - Granados, Adrian |
2013 | A combined discriminative and generative behavior model for cyber physical system defense | Authors: Carvalho, M. - Brunza, S. - Dasgupta, D. - McCusker, O. - Vora, S. |
2013 | A comparison of community identication algorithms for regulatory network motifs | Authors: Carvalho, M. - Oliveira, D. |
2013 | A human-agent teamwork command and control framework for moving target defense (MTC2) | Authors: Marco M. Carvalho - James Lott - Thomas C. Eskridge - Larry Bunch - Daniel Kidwell - Adam Dalton - Jeffrey M. Bradshaw - Paul Feltovich |
2013 | A layered approach to understanding network dependencies on moving target defense mechanisms | Authors: Carvalho, M. - Kidwell, D. - Crosby, S. |
2013 | A scalable approach to network traffic classification for computer network defense using parallel neural network classifier architectures | Authors: Carvalho, M. - Hambebo, B.M. - Ham, F.M. |
2013 | Antimalware software: Do we measure resilience? | Authors: Carvalho, M. - Ford, R. - Bishop, M. - Mayron, L. |
2013 | Cooperation models between humans and artificial self-organizing systems: Motivations, issues and perspectives | Authors: Carvalho, M. - Trentesaux, D. - Rey, G.Z. |
2013 | Domain and location specific modeling of mobile users online interests | Authors: Carvalho, M. - Moghaddam, S. - Helmy, A. |
2013 | Infrastructure Security for Smart Electric Grids: A Survey | Authors: Marco Carvalho - Naran M. Pindoriya - Dipti Srinivasan - Dipankar Dasgupta |
2013 | MTC2: A command and control framework for moving target defense and cyber resilience | Authors: Carvalho, M. - Eskridge, T.C. - Kidwell, D. - Bunch, L. - Bradshaw, J.M. - Dalton, A. - Feltovich, P.J. - Hoffman, R. - Shanklin, T. |
2013 | Optimization and Security Challenges in Smart Power Grids | Authors: Marco Carvalho - Vijay Pappu - Panos Pardalos |
2013 | The language of behavior: Exploring a new formalism for resilient response | Authors: Carvalho, M. - Fink, G.A. |
2013 | Topology design for on-demand dual-path routing in wireless networks | Authors: Carvalho, M. - Balasundaram, B. - Sorokin, A. - Boginski, V. |
2013 | Using network sciences to evaluate the brazilian airline network | Authors: Carvalho, M. - Oliveira, D. - Menezes, R. |
2013 | Visualizing Multi-Agent Systems | Authors: Carvalho, Marco - Eskridge, Thomas C - Polack Jr, Peter J |
2013 | Rational interfaces for effective security software: Polite interaction guidelines for secondary tasks | Authors: Allen, W.H. - Bahr, G.S. |
2012 | System and method of generically detecting the presence of emulated environments | Authors: Ford, Richard - Allen, William - Marin, Gerald |
2012 | CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection | Authors: Marco Carvalho - Richard Ford |
2012 | Sol: An Agent-Based Framework for Cyber Situation Awareness | Authors: Marco Carvalho - Tom Eskridge - Paul J. Feltovich - Larry Bunch - Jeffrey M. Bradshaw - Dan Kidwell - Matt Johnson |
2012 | An adaptive multi-agent-based approach to smart grids control and optimization | Authors: Marco Carvalho - Carlos Perez - Adrian Granados Year: 2012 |
2012 | Preface | Authors: Carvalho, M. - Oplatková, Z. - Byrski, A. - Kisiel-Dorohinicki, M. |
2012 | A hybrid emulation environment for airborne wireless networks | Authors: Carvalho, M. - Granados, A. - Poland, B. - Suprenant, J. - Muccio, M. - Pérez, C. - Arguedas, M. - Hague, D. |
2012 | Advances in Intelligent Modelling and Simulation | Authors: Marco Carvalho - Zuzana Oplatková - Marek Kisiel-Dorohinicki - Aleksander Byrski |
2012 | Command and control requirements for moving-target defense | Authors: Carvalho, M. - Kidwell, D. - Bunch, L. - Bradshaw, J.M. - Feltovich, P.J. - Hoffman, R.R. - Eskridge, T. |
2012 | Human-Agent Teamwork in Cyber Operations: Supporting Co-evolution of Tasks and Artifacts with Luna | Authors: Marco Carvalho - James Lott - Tom Eskridge - Paul J. Feltovich - Larry Bunch - Jeffrey M. Bradshaw - Andrzej Uszok |
2012 | NextVC2 - A next generation virtual world command and control | Authors: Ford, R. - Carvalho, M.M. |
2012 | Organic resilience for tactical environments | Authors: Carvalho, M. - Pérez, C. - Lamkin, T. |
2012 | Policy-based governance within Luna: Why we developed yet another agent framework | Authors: Carvalho, M. - Lott, J. - Bunch, L. - Bradshaw, J.M. - Feltovich, P.J. - Eskridge, T. - Uszok, A. |
2012 | Supporting COTS applications in tactical edge networks | Authors: Morelli, Alessandro - Stefanelli, Cesare - Kohler, Ralph - Suri, Niranjan - Tortonesi, Mauro |
2012 | Throughput maximization in CSMA networks with collisions | Authors: Subramanian, S. - Dixon, W.E. - Pasiliao, E.L. - Carvalho, M.M. - Shea, J.M. |
2012 | Toward metrics for cyber resilience | Authors: Carvalho, Marco M. - Mayron, Liam M. - Ford, Richard - Bishop, Matt |
2012 | XLAYER: A CROSS-LAYER COMMUNICATIONS SUBSTRATE FOR TACTICAL ENVIRONMENTS | Authors: Carvalho, Marco M. |
2012 | Ontology creation as a sensemaking activity | Authors: Eskridge, T.C. - Hoffman, R. |
2012 | A human-agent teamwork approach to moving target defense command and control | Authors: Eskridge, T - Lott, J - Carvalho, M - Hoffman, R - Bradshaw, JM - Feltovich, P - Kidwell, D - Bunch, L |
2012 | Principles of continuous analogical reasoning | Authors: Eskridge, Thomas Charles |
2012 | Detecting emulated environments | Authors: Ford, R. - Allen, W. - Marin, G. - Tilley, S. - Parveen, T. |
2011 | A Distributed Computing Platform for Heterogeneous Data Processing | Authors: Carvalho, Marco - Byrski, Aleksander - Dajda, Jacek - Pietak, Kamil - Kisiel-Dorohinicki, Marek - Arguedas, Marco |
2011 | An evolutionary multi-agent approach to anomaly detection and cyber defense | Authors: Carvalho, M. - Pérez, C. |
2011 | Automatic discovery of attack messages and pre-and post-conditions for attack graph generation | Authors: Carvalho, M. - Teng, C.M. |
2011 | Dynamic policy-driven quality of service in service-oriented information management systems | Authors: Carvalho, M. - Bunch, L. - Gillen, M. - Martignoni III, A. - Schmidt, D.C. - Paulos, A. - Loyall, J.P. - Sinclair, A. - Edmondson, J. |
2011 | Integrated information and network management for end-to-end quality of service | Authors: Carvalho, M. - Granados, A. - Gillen, M. - Sinclair, A. - Loyall, J. - Usbeck, K. - Hanna, J.P. |
2011 | Mission resilience in cloud computing: A biologically inspired approach | Authors: Carvalho, M. - Dasgupta, D. - Pérez, C. - Grimaila, M. Year: 2011 |
2011 | Network traffic classification using a parallel neural network classifier architecture | Authors: Carvalho, M. - Ham, F. - Mathewos, B. |
2011 | Resilience is more than availability | Authors: Carvalho, M. - Ford, R. - Bishop, M. - Mayron, L.M. |
2011 | Secure VM for monitoring industrial process controllers | Authors: Carvalho, M. - Dasgupta, D. - Ali, Mohd.H. - Abercrombie, R. - Schlicher, B. - Sheldon, F. |
2011 | The mLab-PENGWUN hybrid emulation environment for airborne networks | Authors: Carvalho, Marco - Granados, Joel Andr{\'e}s - Montoya, Edwin |
2011 | XTC+: descripción y análisis de un mecanismo de control de topoloǵıa para los MANET | Authors: Hoffman, Robert R - Eskridge, Thomas C - Moon, Brian M - Coffey, John W |
2011 | Skills in applied concept mapping | Authors: Allen, W.H. - Alkussayer, A. |
2011 | Security risk analysis of software architecture based on AHP | Authors: Allen, W.H. - Alkussayer, A. |
2010 | Experiences with practice-focused undergraduate security education | Authors: Terrence J. O,Connor - Robert L. Fanelli |
2010 | Keystroke dynamics: Characteristics and opportunities | Authors: Heather Crawford |
2010 | A Crisis Management Approach to Mission Survivability in Computational Multi-Agent Systems | Authors: Carvalho, Marco - Byrski, Aleksander - Kiisiel-Dorohinicki, Marek |
2010 | A cross-layer approach to mixed-control topology management for MANETs | Authors: Carvalho, M. - Granados, A. - Subramanian, S. - Pérez, C. |
2010 | A directed expansion topology control algorithm for mobile ad-hoc networks | Authors: Carvalho, M. - Pérez, C. - Arguedas, M. - Kraus, W. - Hoback, K. |
2010 | A dynamic and policy-controlled approach to federating information systems | Authors: Carvalho, M. - Hillman, R. - Suri, N. - Hanna, J. - Marcon, M. - Breedy, M. - Sinclair, A. - Uszok, A. - Bradshaw, J.M. - Combs, V. |
2010 | Automated Risk Assessment of Sensor Disclosure in Coalition Operations | Authors: Carvalho, Marco - Bradshaw, Jeffrey M. - Perez, Carlos |
2010 | Configurable and secure system architectures | Authors: Carvalho, M. - Dasgupta, D. |
2010 | Distributed policy learning for the cognitive network management system | Authors: Carvalho, M. - Pérez, C. - VanderHorn, N. - Haan, B. |
2010 | Dynamic policy-driven quality of service in service-oriented systems | Authors: Carvalho, M. - Bunch, L. - Gillen, M. - Martignoni III, A. - Schmidt, D.C. - Paulos, A. - Loyall, J.P. - Edmondson, J. - Varshneya, P. |
2010 | Rapid Creation and Deployment of Communities of Interest Using the CMap Ontology Editor and the KAoS Policy Services Framework | Authors: Tom Eskridge - Jeffrey M. Bradshaw - Andrzej Uszok - James Hanna |
2010 | A scenario-based framework for the security evaluation of software architecture | Authors: Allen, W.H. - Alkussayer, A. |
2010 | Proactive reputation-based defense for MANETs using radial basis function neural networks | Authors: Ford, R. - Ham, F.M. - Allen, W. - Imana, E.Y. |
2010 | The ISDF Framework: Towards Secure Software Development | Authors: Allen, William H - Alkussayer, Abdulaziz |
2009 | Toward instrumenting network warfare competitions to generate labeled datasets | Authors: Robert L. Fanelli - T. J. O'Connor - Benjamin Sangster - Thomas Cook - Erik Dean - William J. Adams - Chris Morrell - Gregory Conti |
2009 | A Naturalistic Exploration of Forms and Functions of Analogizing | Authors: Tom Eskridge - Robert R. Hoffman - Cameron Shelley |
2009 | A distributed reinforcement learning approach to mission survivability in tactical MANETs | Authors: Carvalho, M. |
2009 | Adaptive Security for MANETs via Biology | Authors: Carvalho, Marco - Ford, Richard - Allen, William H - Ham, Frederic |
2009 | Agile Computing and its Applications to Army Tactical Environments | Authors: Carvalho, Marco - Tokarcik, L. - Ansaloni, D. - Quitadamo, R. - Rebeschini, M. - Kovach, J. - Benincasa, G. - Tortonesi, M. - Choy, S. - Winkler, R. - Suri, N. - Marcon, M. - Breedy, M. - Bradshaw, Jeffrey M. - Arguedas, M. - Benvegnu, E. |
2009 | Danger theory and collaborative filtering in MANETs | Authors: Carvalho, M. - Ford, R. - Hoffman, K. - Allen, W.H. - Ondi, A. - Brown, D. - Marin, G.A. |
2009 | Dynamic gateway selection for cross-domain routing with the XLayer communications substrate | Authors: Carvalho, M. - Granados, A. - Pérez, C. |
2009 | Enabling information management systems in tactical network environments | Authors: Carvalho, M. - Bradshaw, J.M. - Uszok, A. - Sinclair, A. - Hanna, J.P. - Suri, N. - Ceccio, P.J. |
2009 | Generic danger detection for mission continuity | Authors: Carvalho, M. - Ford, R. - Hoffman, K. - Ondi, A. - Allen, W |
2009 | Investigating the use of topology adaptation for robust multi-path transport: A preliminary study | Authors: Carvalho, M. - Granados, A. - Pérez, C. - Arguedas, M. - Kraus, W. - Hoback, K. |
2009 | QoS enabled dissemination of managed information objects in a publish-subscribe-query information broker | Authors: Carvalho, M. - Bunch, L. - Gillen, M. - Martignoni III, A. - Loyall, J.P. - Edmondson, J. - Sinclaire, A. - Corman, D. - Schmidt, D. |
2009 | Quality of service in US air force information management systems | Authors: Carvalho, M. - Bunch, L. - Gillen, M. - Martignoni III, A. - Sinclair, A. - Loyall, J. - Marcon, M. |
2009 | Security in MANETs using reputation-adjusted routing | Authors: Carvalho, M. - Ford, R. - Pérez, C. - Hoffman, K. - Ondi, A. - Allen, W. |
2009 | Supporting Federated Information Spaces with the Joint Battlespace Infosphere (JBI) Platform | Authors: Carvalho, Marco - Bradshaw, Jeffrey M. - Suri, Niranjan - Marcon, M. - Breedy, Maggie - Hutchenson, Tim - Hanna, James P. - Uszok, Andrzej - Hillman, Robert |
2009 | From Tools to Teammates: Joint Activity in Human-Agent-Robot Teams | Authors: Maggie Breedy - Jurriaan van Diggelen - Andrzej Uszok - Paul Feltovich - Jeffrey M. Bradshaw - Larry Bunch - Matthew Johnson - Tom Eskridge - James Lott - Hyuckchul Jung |
2009 | A MANET simulator (M-SIM) with an extended worm propagation epidemic model | Authors: Ford, R. - Ham, F.M. - Ondi, A. - Allen, W. - Imana, E. - Reedy, M. |
2009 | Malware shall greatly increase⋯ | Authors: Ford, R. - Allen, W.H. |
2009 | Reputation prediction in mobile ad hoc networks using RBF neural networks | Authors: Ford, R. - Ham, F.M. - Ondi, A. - Allen, W. - Imana, E.Y. - Reedy, M. |
2009 | The ISDF framework: Integrating security patterns and best practices |
Authors: Allen, W.H. - Alkussayer, A. |
2009 | Towards Automatic Security Scenario Generation | Authors: Allen, William H - Alkussayer, Abdulaziz |
2009 | Towards secure software development: Integrating security patterns into a secure SDLC | Authors: Alkussayer, A - Allen, WH |
2008 | A cross-layer communications substrate for tactical information management systems | Authors: Carvalho, M. - Granados, A. - Hanna, J.P. - Brothers, A. - Naqvi, W. - Turck, K. |
2008 | A cross-layer predictive routing protocol for mobile ad hoc networks | Authors: Carvalho, M. - Pérez, C. - Winkler, R. - Choy, S. - Kovach, J. |
2008 | A three-tier damage-driven security infrastructure for mission continuity | Authors: Carvalho, Marco - Ford, Richard - Allen, William - Marin, Gerald |
2008 | Agent-based immunological intrusion detection system for mobile Ad-hoc networks | Authors: Carvalho, M. - Byrski, A. |
2008 | Coordinated Operations in Mixed Teams of Humans and Robots | Authors: Carvalho, Marco - Johnson, Matt - Bradshaw, Jeffrey M. - Suri, Niranjan - Allen, James - Intlekofer, K. - Jung, Hyuckchul |
2008 | MANET Simulation and Security: New Wineskins for New Wine? | Authors: Carvalho, Marco - Ford, Richard - Perez, Carlos - Allen, William - Marin, G. - Ondi, Attila |
2008 | Policy management across multiple platforms and application domains | Authors: Carvalho, M. - Bradshaw, J.M. - Suri, N. - Johnson, M. - Jung, H. |
2008 | Securing MANETs with BITSI: danger theory and mission continuity | Authors: Carvalho, Marco - Ford, Richard - Allen, William - Marin, Gerald |
2008 | Security in mobile ad hoc networks | Authors: Carvalho, M. |
2008 | Coordination in human-agent-robot teamwork | Authors: Lott, J. - Bunch, L. - Bradshaw, J.M. - Feltovich, P.J. - Eskridge, T. - Uszok, A. - Jung, H. - Breedy, M.R. - Johnson, M.J. |
2008 | A structuration agency approach to security policy enforcement in mobile ad hoc networks | Authors: Ford, Richard - Allen, William - Workman, Michael |
2008 | One of these things is not like the Others: Collaborative filtering in MANETs | Authors: Ford, R. - Hoffman, K. - Marin, G. - Carvalho, M - Ondi, A - Brown, D - Allen, W |
2008 | Towards the detection of emulated environments via analysis of the stochastic nature of system calls | Authors: Ford, R. - Allen, W. - Marin, G. - Tilley, S. - Parveen, T. |
2007 | A cross-layer communications framework for tactical environments | Authors: Carvalho, M. - Arguedas, M. - Breedy, M. - Suri, N. - Rebeschini, M. |
2007 | A cross-layer communications substrate for tactical communications middleware | Authors: Carvalho, M. - Granados, A. - Pérez, C. - Suri, N. - Rebeschini, M. |
2007 | An Agile Computing Approach to Dynamic and Adpative Service-Oriented Architectures | Authors: Carvalho, Marco - Suri, Niranjan - Arguedas, Marco - Breedy, Maggie - Stabellini, S. - Rebeschini, Matteo |
2007 | BITSI: A Biologically-Inspired Adaptive Defense Framework | Authors: Carvalho, M. - Ford, R. - Allen, W. |
2007 | Network conditions monitoring in the Mockets communications framework | Authors: Carvalho, M. - Suri, N. - Tortonesi, M. - Stefanelli, C. |
2007 | Policy-based bandwidth management for tactical networks with the agile computing middleware | Authors: Carvalho, M. - Lott, J. - Bradshaw, J.M. - Arguedas, M. - Breedy, M. - Suri, N. - Tortonesi, M. |
2007 | How not to be seen | Authors: Allen, W.H. |
2007 | How not to be seen II: The defenders fight back | Authors: Allen, W.H. |
2007 | Mixing wheat with the chaff | Authors: Allen, W.H. |
2006 | N-Version Programming for the Detection of Zero-day Exploits | Authors: Ford, Richard - Allen, William H - Nagy, Lajos |
2006 | Resource and Service Discovery in Wireless AD-HOC Networks with Agile Computing | Authors: Carvalho, Marco - Suri, Niranjan - Arguedas, Marco - Breedy, Maggie - Rebeschini, Matteo |
2006 | A Cross-layer Network Substrate for the Battlefield | Authors: Carvalho, Marco - Suri, Niranjan - Lloyd, E. - Shurbanov, V. |
2006 | A chat interface for human-agent interaction in MAST | Authors: Carvalho, M. - Suri, N. - Rebeschini, M. - Horsley, J. |
2006 | A distributed stand-in agent based algorithm for opportunistic resource allocation | Authors: Carvalho, M. - Suri, N. - Pěchouček, M. - Jisl, P. - Benda, P. |
2006 | Distributed Resource Coordination Strategies for Mobile Ad hoc Networks | Authors: Carvalho, Marco |
2006 | A model-based approach to the security testing of network protocol implementations | Authors: Allen, William H - Dou, Chin - Marin, Gerald A |
2006 | Needles in Haystacks: Practical Intrusion Detection from Theoretical Results | Authors: Allen, William H - Marin, Gerald A |
2005 | Simulation for Evaluating the Usability of Integrated Flight Decks | |
2005 | A Mobile Agent-Based Middleware for Opportunistic Resource Allocation and Communications | Authors: Carvalho, Marco - Suri, Niranjan - Pechoucek, Michal |
2005 | A mobile agent-based communications middleware for data streaming in the battle | Authors: Carvalho, M. - Arguedas, M. - Suri, N. |
2005 | Concept maps: Integrating knowledge and information visualization | Authors: Carvalho, M. - Eskridge, T.C. - Lott, J. - Arguedas, M. - Hill, G. - Cañas, A.J. - Carvajal, R. - Carff, R. |
2005 | Flexible automated monitoring and notification for complex processes using KARMEN | Authors: Carvalho, M. - Bunch, L. - Bradshaw, J.M. - Breedy, M. - Suri, N. - Danks, D. |
2005 | KARMEN: Multi-agent monitoring and notification for complex processes | Authors: Carvalho, M. - Bunch, L. - Bradshaw, J.M. - Breedy, M. - Suri, N. |
2005 | MAST: Intelligent Roaming Guards for Network and Host Security | Authors: Carvalho, Marco - Suri, Niranjan - Breedy, Maggie - Rebeschini, Matteo - Cowin, Tom - Horsley, James |
© Florida Institute of Technology, All Rights Reserved