Rayford Vaughn
Rayford Vaughn
Dirección de correo verificada de
Citado por
Citado por
Fuzzy data mining and genetic algorithms applied to intrusion detection
SM Bridges, RB Vaughn
Proceedings of 12th annual Canadian information technology security …, 2000
Information assurance measures and metrics-state of practice and proposed taxonomy
RB Vaughn, R Henning, A Siraj
36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003
A retrofit network intrusion detection system for MODBUS RTU and ASCII industrial control systems
T Morris, R Vaughn, Y Dandass
2012 45th Hawaii International Conference on System Sciences, 2338-2345, 2012
Fuzzy cognitive maps for decision support in an intelligent intrusion detection system
A Siraj, SM Bridges, RB Vaughn
Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International …, 2001
Overview of the Mars Pathfinder Mission: Launch through landing, surface operations, data sets, and science results
MP Golombek, RC Anderson, JR Barnes, JF Bell III, NT Bridges, DT Britt, ...
Journal of Geophysical Research: Planets 104 (E4), 8523-8553, 1999
An improved algorithm for fuzzy data mining for intrusion detection
G Florez, SA Bridges, RB Vaughn
2002 Annual Meeting of the North American Fuzzy Information Processing …, 2002
Intrusion detection via fuzzy data mining
SM Bridges, RB Vaughn
12th Annual Canadian Information Technology Security Symposium, 109-122, 2000
Cluster security research involving the modeling of network exploitations using exploitation graphs
W Li, RB Vaughn
Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID …, 2006
Deterministic intrusion detection rules for MODBUS protocols
TH Morris, BA Jones, RB Vaughn, YS Dandass
2013 46th Hawaii International Conference on System Sciences, 1773-1781, 2013
A testbed for SCADA control system cybersecurity research and pedagogy
T Morris, R Vaughn, YS Dandass
Proceedings of the Seventh Annual Workshop on Cyber Security and Information …, 2011
Phighting the phisher: Using web bugs and honeytokens to investigate the source of phishing attacks
CM McRae, RB Vaughn
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
Intrusion sensor data fusion in an intelligent intrusion detection system architecture
A Siraj, RB Vaughn, SM Bridges
37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004
Engineering future cyber-physical energy systems: Challenges, research needs, and roadmap
TH Morris, AK Srivastava, B Reaves, K Pavurapu, S Abdelwahed, ...
41st North American power symposium, 1-6, 2009
Information system security compliance to FISMA standard: a quantitative measure
E Hulitt, RB Vaughn
Telecommunication Systems 45, 139-152, 2010
Combining static analysis and dynamic learning to build accurate intrusion detection models
Z Liu, SM Bridges, RB Vaughn
Third IEEE International Workshop on Information Assurance (IWIA'05), 164-177, 2005
An empirical study of industrial security-engineering practices
RB Vaughn Jr, R Henning, K Fox
Journal of Systems and software 61 (3), 225-232, 2002
Software requirement understanding using Pathfinder networks: Discovering and evaluating mental models
UK Kudikyala, RB Vaughn
Journal of Systems and Software 74 (1), 101-108, 2005
Adaptive intrusion detection with data mining
M Hossain, SM Bridges, RB Vaughn
SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems …, 2003
Building an information security education program
RB Vaughn, DA Dampier, MB Warkentin
Proceedings of the 1st annual conference on Information security curriculum …, 2004
An approach to model network exploitations using exploitation graphs
W Li, RB Vaughn, YS Dandass
Simulation 82 (8), 523-541, 2006
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20