Fingerprint Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 3 Similar Profiles
Model Mathematics
Costs Engineering & Materials Science
Recovery Engineering & Materials Science
Communication Engineering & Materials Science
Petri nets Engineering & Materials Science
Security systems Engineering & Materials Science
Availability Engineering & Materials Science
Fault tolerance Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1985 2017

Accounting for the human user in predictive security models

Noureddine, M. A., Marturano, A., Keefe, K., Bashiry, M. & Sanders, W. H. May 5 2017 Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. IEEE Computer Society, p. 329-338 10 p. 7920638

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social sciences
Security systems

Learning process behavioral baselines for anomaly detection

Fawaz, A. M. & Sanders, W. H. May 5 2017 Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. IEEE Computer Society, p. 145-154 10 p. 7920608

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Engines

On train automatic stop control using balises: Attacks and a software-only countermeasure

Temple, W. G., Tran, B. A. N., Chen, B., Kalbarczyk, Z. & Sanders, W. H. May 5 2017 Proceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017. IEEE Computer Society, p. 274-283 10 p. 7920632

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Availability
Controllers

A comparison of different intrusion detection approaches in an advanced metering infrastructure network using ADVISE

Rausch, M., Feddersen, B., Keefe, K. & Sanders, W. H. 2016 Quantitative Evaluation of Systems - 13th International Conference, QEST 2016, Proceedings. Springer Verlag, Vol. 9826, p. 279-294 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9826)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Advanced metering infrastructures
Intrusion detection
Infrastructure
Metric
Evaluation

A game-theoretic approach to respond to attacker lateral movement

Noureddine, M. A., Fawaz, A., Sanders, W. H. & Başar, T. 2016 Decision and Game Theory for Security - 7th International Conference, GameSec 2016, Proceedings. Springer Verlag, Vol. 9996 LNCS, p. 294-313 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9996 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Monitoring
Industry
Intrusion detection
Labels
Engines