AIFIS: Artificial Intelligence (AI)-Based Forensic Investigative System | 0 | 0.34 | 2022 |
Can You Trust Zero Trust? | 1 | 0.48 | 2022 |
Generating Cyber-Physical System Risk Overlays for Attack and Fault Trees using Systems Theory | 0 | 0.34 | 2022 |
An Attack Vector Taxonomy for Mobile Telephony Security Vulnerabilities | 0 | 0.34 | 2021 |
Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments. | 0 | 0.34 | 2020 |
An Attack-Fault Tree Analysis Of A Movable Railroad Bridge | 0 | 0.34 | 2019 |
Sharing Genetic Data under US Privacy Laws. | 0 | 0.34 | 2018 |
Positive Train Control Security: An Intrusion-Detection System to Provide Cyber-Situational Awareness | 1 | 0.35 | 2018 |
A Layered Graphical Model for Cloud Forensic Mission Attack Impact Analysis. | 0 | 0.34 | 2018 |
Pseudonym Certificate Validations under Heavy Vehicular Traffic Loads | 0 | 0.34 | 2018 |
ADS-Bsec: A Holistic Framework to Secure ADS-B. | 0 | 0.34 | 2018 |
An Authentication Mechanism for Accessing Mobile Web Services. | 0 | 0.34 | 2017 |
Key Distribution Scheme For Aircraft Equipped With Secure Ads-B In | 1 | 0.69 | 2017 |
A layered graphical model for mission attack impact analysis. | 0 | 0.34 | 2017 |
Detecting Data Manipulation Attacks on the Substation Interlocking Function Using Direct Power Feedback. | 0 | 0.34 | 2017 |
ADS-Bsec: A novel framework to secure ADS-B | 2 | 0.41 | 2017 |
Identifying Evidence for Cloud Forensic Analysis. | 1 | 0.39 | 2017 |
An ADS-B Intrusion Detection System | 0 | 0.34 | 2016 |
Secure ADS-B design & evaluation | 0 | 0.34 | 2015 |
POSTER: A Logic Based Network Forensics Model for Evidence Analysis | 0 | 0.34 | 2015 |
A Logic-Based Network Forensic Model for Evidence Analysis. | 6 | 0.59 | 2015 |
A Model Towards Using Evidence from Security Events for Network Attack Analysis. | 3 | 0.48 | 2014 |
An Automated Dialog System For Conducting Security Interviews For Access Control | 0 | 0.34 | 2014 |
An Ontology for Medical Treatment Consent. | 1 | 0.63 | 2014 |
Toward the Discovery and Extraction of Money Laundering Evidence from Arbitrary Data Formats using Combinatory Reductions. | 0 | 0.34 | 2014 |
Timely Delivery Of Messages In Positive Train Control | 0 | 0.34 | 2013 |
Navigation Assistance Framework for Emergencies. | 0 | 0.34 | 2013 |
Creating Integrated Evidence Graphs for Network Forensics. | 3 | 0.50 | 2013 |
Mapping evidence graphs to attack graphs | 3 | 0.45 | 2012 |
Leveraging an Inventory of the Cognitive Radio Attack Surface | 2 | 0.86 | 2012 |
A Policy-Based Dialogue System for Physical Access Control. | 1 | 0.63 | 2012 |
Using Attack Graphs in Forensic Examinations | 9 | 0.68 | 2012 |
Forensic Web Services Framework | 3 | 0.42 | 2011 |
QoP and QoS Policy Cognizant Module Composition | 1 | 0.38 | 2010 |
Ontological Constructs to Create Money Laundering Schemes. | 2 | 0.52 | 2010 |
Achieving peer-to-peer telecommunication services through social hashing | 2 | 0.42 | 2010 |
Fine-grained Sharing of Health Records using XSPA Profile for XACML - An Extended Abstract. | 0 | 0.34 | 2010 |
Tracking skype VoIP calls over the internet | 6 | 0.41 | 2010 |
Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services | 2 | 0.38 | 2010 |
Us Federal Oversight Of Rail Transportation Of Toxic By Inhalation Materials | 0 | 0.34 | 2010 |
A comprehensive privacy-aware authorization framework founded on HIPAA privacy rules | 8 | 0.67 | 2010 |
A testbed for large mobile social computing experiments | 4 | 0.38 | 2010 |
A Society-Integrated Testbed Architecture For Peer-To-Peer Telecommunications | 1 | 0.38 | 2009 |
A Testbed For Mobile Social Computing | 2 | 0.40 | 2009 |
SQLProb: a proxy-based architecture towards preventing SQL injection attacks | 36 | 1.48 | 2009 |
Online detection of web choreography misuses | 1 | 0.37 | 2009 |
A role-based XACML administration and delegation profile and its enforcement architecture | 5 | 0.47 | 2009 |
Enforcing Security Policies in Requirements Engineering Using AFUML | 0 | 0.34 | 2008 |
Forensic Web Services | 8 | 0.61 | 2008 |
Model-Based Covert Timing Channels: Automated Modeling and Evasion | 60 | 2.15 | 2008 |