Fingerprint Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 3 Similar Profiles
Model Mathematics
Modeling Mathematics
Communication Engineering & Materials Science
Reward Mathematics
Dependability Mathematics
Security systems Engineering & Materials Science
Fault tolerance Engineering & Materials Science
Advanced metering infrastructures Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1985 2017

A case study assessing the effects of cyber attacks on a river zonal dispatcher

Wright, R. J., Keefe, K., Feddersen, B. & Sanders, W. H. Jan 1 2017 Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers. Springer Verlag, Vol. 10242 LNCS, p. 252-264 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10242 LNCS)

Research output: ResearchConference contribution

Attack
Rivers
Modeling
Intrusion detection
Security systems

Accounting for the human user in predictive security models

Noureddine, M. A., Marturano, A., Keefe, K., Bashiry, M. & Sanders, W. H. May 5 2017 Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. IEEE Computer Society, p. 329-338 10 p. 7920638

Research output: ResearchConference contribution

Security systems
Uncertainty

An unsupervised multi-detector approach for identifying malicious lateral movement

Bohara, A., Noureddine, M. A., Fawaz, A. & Sanders, W. H. Oct 13 2017 Proceedings - 2017 IEEE 36th International Symposium on Reliable Distributed Systems, SRDS 2017. IEEE Computer Society, Vol. 2017-September, p. 224-233 10 p. 8069085

Research output: ResearchConference contribution

Command and Control
Network Security
Anomaly Detection
Principal Component Analysis
Lateral

ATTAIN: An Attack Injection Framework for Software-Defined Networking

Ujcich, B. E., Thakore, U. & Sanders, W. H. Aug 30 2017 Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. Institute of Electrical and Electronics Engineers Inc., p. 567-578 12 p. 8023155

Research output: ResearchConference contribution

Controllers
Industry

Data-driven model-based detection of malicious insiders via physical access logs

Cheh, C., Chen, B., Temple, W. G. & Sanders, W. H. Jan 1 2017 Quantitative Evaluation of Systems - 14th International Conference, QEST 2017, Proceedings. Springer Verlag, Vol. 10503 LNCS, p. 275-291 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10503 LNCS)

Research output: ResearchConference contribution

Data-driven
Model-based
Access control
Control systems
Movement