Name
Affiliation
Papers
FREDERICK SHELDON
Oak Ridge National Laboratory
36
Collaborators
Citations 
PageRank 
87
86
16.46
Referers 
Referees 
References 
150
474
193
Search Limit
100474
Title
Citations
PageRank
Year
IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses00.342021
Examining the Performance of Fog-Aided, Cloud-Centered IoT in a Real-World Environment00.342021
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning20.372020
Taxonomy and Survey of Interpretable Machine Learning Method00.342020
G-Model: A Novel Approach to Privacy-Preserving 1:M Microdata Publication00.342020
Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack10.372020
Elliptic Envelope Based Detection of Stealthy False Data Injection Attacks in Smart Grid Control Systems.00.342020
Performance Analysis of Two Cloud-Based IoT Implementations: Empirical Study00.342020
Authoring Adaptive Digital Computational Thinking Lessons Using vTutor for Web-Based Learning.00.342018
A Best-Effort Damage Mitigation Model for Cyber-Attacks on Smart Grids.00.342018
METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security00.342018
Introduction to Supply Chain Security and Mutual Trust Research Minitrack.00.342017
Hardening the Client-Side: A Guide to Enterprise-Level Hardening of Web Browsers.00.342017
A data integrity verification scheme in mobile cloud computing.50.412017
Model-Based Autonomic Security Management For Cyber-Physical Infrastructures00.342016
CSSR: Cloud Services Security Recommender10.372016
Security Analysis of Smart Grid Cyber Physical Infrastructures Using Game Theoretic Simulation00.342015
Risk Assessment For Industrial Control Systems Quantifying Availability Using Mean Failure Cost (MFC).10.352015
Quantifying the impact of unavailability in cyber-physical environments.10.372014
Quantifying availability in SCADA environments using the cyber security metric MFC00.342014
Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment20.372013
Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA)30.452013
Intrinsically resilient energy control systems10.352013
The Insecurity of Wireless Networks100.902012
Validating Cyber Security Requirements: A Case Study10.362011
Has the cyber warfare threat been overstated?: a cheap talk game-theoretic analysis on the Google-hacking claim?00.342011
Secure VM for monitoring industrial process controllers00.342011
Secure cryptographic key management system (CKMS) considerations for smart grid devices10.352011
Anomaly detection in multiple scale for insider threat analysis00.342011
The handicap principle, strategic information warfare and the paradox of asymmetry00.342010
Quantifying security threats and their potential impacts: a case study271.722010
DOE grass roots panel00.342009
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission181.512009
Towards an Engineering Discipline of Computational Society00.342007
Measuring Reliability as a Mean Failure Cost80.822007
Managing secure survivable critical infrastructures to avoid vulnerabilities40.622004