IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses | 0 | 0.34 | 2021 |
Examining the Performance of Fog-Aided, Cloud-Centered IoT in a Real-World Environment | 0 | 0.34 | 2021 |
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning | 2 | 0.37 | 2020 |
Taxonomy and Survey of Interpretable Machine Learning Method | 0 | 0.34 | 2020 |
G-Model: A Novel Approach to Privacy-Preserving 1:M Microdata Publication | 0 | 0.34 | 2020 |
Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack | 1 | 0.37 | 2020 |
Elliptic Envelope Based Detection of Stealthy False Data Injection Attacks in Smart Grid Control Systems. | 0 | 0.34 | 2020 |
Performance Analysis of Two Cloud-Based IoT Implementations: Empirical Study | 0 | 0.34 | 2020 |
Authoring Adaptive Digital Computational Thinking Lessons Using vTutor for Web-Based Learning. | 0 | 0.34 | 2018 |
A Best-Effort Damage Mitigation Model for Cyber-Attacks on Smart Grids. | 0 | 0.34 | 2018 |
METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security | 0 | 0.34 | 2018 |
Introduction to Supply Chain Security and Mutual Trust Research Minitrack. | 0 | 0.34 | 2017 |
Hardening the Client-Side: A Guide to Enterprise-Level Hardening of Web Browsers. | 0 | 0.34 | 2017 |
A data integrity verification scheme in mobile cloud computing. | 5 | 0.41 | 2017 |
Model-Based Autonomic Security Management For Cyber-Physical Infrastructures | 0 | 0.34 | 2016 |
CSSR: Cloud Services Security Recommender | 1 | 0.37 | 2016 |
Security Analysis of Smart Grid Cyber Physical Infrastructures Using Game Theoretic Simulation | 0 | 0.34 | 2015 |
Risk Assessment For Industrial Control Systems Quantifying Availability Using Mean Failure Cost (MFC). | 1 | 0.35 | 2015 |
Quantifying the impact of unavailability in cyber-physical environments. | 1 | 0.37 | 2014 |
Quantifying availability in SCADA environments using the cyber security metric MFC | 0 | 0.34 | 2014 |
Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment | 2 | 0.37 | 2013 |
Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA) | 3 | 0.45 | 2013 |
Intrinsically resilient energy control systems | 1 | 0.35 | 2013 |
The Insecurity of Wireless Networks | 10 | 0.90 | 2012 |
Validating Cyber Security Requirements: A Case Study | 1 | 0.36 | 2011 |
Has the cyber warfare threat been overstated?: a cheap talk game-theoretic analysis on the Google-hacking claim? | 0 | 0.34 | 2011 |
Secure VM for monitoring industrial process controllers | 0 | 0.34 | 2011 |
Secure cryptographic key management system (CKMS) considerations for smart grid devices | 1 | 0.35 | 2011 |
Anomaly detection in multiple scale for insider threat analysis | 0 | 0.34 | 2011 |
The handicap principle, strategic information warfare and the paradox of asymmetry | 0 | 0.34 | 2010 |
Quantifying security threats and their potential impacts: a case study | 27 | 1.72 | 2010 |
DOE grass roots panel | 0 | 0.34 | 2009 |
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission | 18 | 1.51 | 2009 |
Towards an Engineering Discipline of Computational Society | 0 | 0.34 | 2007 |
Measuring Reliability as a Mean Failure Cost | 8 | 0.82 | 2007 |
Managing secure survivable critical infrastructures to avoid vulnerabilities | 4 | 0.62 | 2004 |