关注
Frederick T. Sheldon
Frederick T. Sheldon
Professor
在 uidaho.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Blockchain: properties and misconceptions
D Conte de Leon, AQ Stalick, AA Jillepalli, MA Haney, FT Sheldon
Asia Pacific Journal of Innovation and Entrepreneurship 11 (3), 286-300, 2017
2192017
Metrics for maintainability of class inheritance hierarchies
FT Sheldon, K Jerath, H Chung
Journal of Software Maintenance and Evolution: Research and Practice 14 (3 …, 2002
1142002
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning
M Ashrafuzzaman, S Das, Y Chakhchoukh, S Shiva, FT Sheldon
Computers & Security 97, 101994, 2020
922020
IoT intrusion detection using machine learning with a novel high performing feature selection method
K Albulayhi, Q Abu Al-Haija, SA Alsuhibany, AA Jillepalli, ...
Applied Sciences 12 (10), 5015, 2022
912022
Detecting stealthy false data injection attacks in power grids using deep learning
M Ashrafuzzaman, Y Chakhchoukh, AA Jillepalli, PT Tosic, DC de Leon, ...
2018 14th International Wireless Communications & Mobile Computing …, 2018
802018
Reliability measurement: From theory to practice
FT Sheldon, KM Kavi, RC Tausworthe, JT Yu, R Brettschneider, ...
IEEE Software 9 (4), 13-20, 1992
791992
A survey of crypto ransomware attack detection methodologies: an evolving outlook
A Alqahtani, FT Sheldon
Sensors 22 (5), 1837, 2022
772022
Quantifying security threats and their potential impacts: a case study
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Innovations in Systems and Software Engineering 6, 269-281, 2010
742010
IoT intrusion detection taxonomy, reference architecture, and analyses
K Albulayhi, AA Smadi, FT Sheldon, RK Abercrombie
Sensors 21 (19), 6432, 2021
722021
A methodology to evaluate agent oriented software engineering techniques
CE Lin, KM Kavi, FT Sheldon, KM Daley, RK Abercrombie
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
722007
The insecurity of wireless networks
FT Sheldon, JM Weber, SM Yoo, WD Pan
IEEE Security & Privacy 10 (4), 54-61, 2012
622012
Isaac: The idaho cps smart grid cybersecurity testbed
IA Oyewumi, AA Jillepalli, P Richardson, M Ashrafuzzaman, BK Johnson, ...
2019 IEEE Texas Power and Energy Conference (TPEC), 1-6, 2019
472019
Methodology for evaluating security controls based on key performance indicators and stakeholder mission
FT Sheldon, RK Abercrombie, A Mili
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
462009
A short survey on quantum computers
Y Kanamori, SM Yoo, WD Pan, FT Sheldon
International Journal of Computers and Applications 28 (3), 227-233, 2006
462006
Empirical evaluation of the ensemble framework for feature selection in ddos attack
S Das, D Venugopal, S Shiva, FT Sheldon
2020 7th IEEE International Conference on Cyber Security and Cloud Computing …, 2020
452020
Network intrusion detection and comparative analysis using ensemble machine learning and feature selection
S Das, S Saha, AT Priyoti, EK Roy, FT Sheldon, A Haque, S Shiva
IEEE transactions on network and service management 19 (4), 4821-4833, 2021
442021
Access control in fog computing: Challenges and research agenda
MA Aleisa, A Abuhussein, FT Sheldon
IEEE Access 8, 83986-83999, 2020
442020
A data integrity verification scheme in mobile cloud computing
C Lin, Z Shen, Q Chen, FT Sheldon
journal of Network and Computer Applications 77, 146-151, 2017
402017
Cyberspace security system
RK Abercrombie, FT Sheldon, EM Ferragut
US Patent 8,762,188, 2014
392014
Defining and computing a value based cyber-security measure
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Proceedings of the Second Kuwait Conference on e-Services and e-Systems, 1-9, 2011
392011
系统目前无法执行此操作,请稍后再试。
文章 1–20