Blockchain: properties and misconceptions D Conte de Leon, AQ Stalick, AA Jillepalli, MA Haney, FT Sheldon Asia Pacific Journal of Innovation and Entrepreneurship 11 (3), 286-300, 2017 | 219 | 2017 |
Metrics for maintainability of class inheritance hierarchies FT Sheldon, K Jerath, H Chung Journal of Software Maintenance and Evolution: Research and Practice 14 (3 …, 2002 | 114 | 2002 |
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning M Ashrafuzzaman, S Das, Y Chakhchoukh, S Shiva, FT Sheldon Computers & Security 97, 101994, 2020 | 92 | 2020 |
IoT intrusion detection using machine learning with a novel high performing feature selection method K Albulayhi, Q Abu Al-Haija, SA Alsuhibany, AA Jillepalli, ... Applied Sciences 12 (10), 5015, 2022 | 91 | 2022 |
Detecting stealthy false data injection attacks in power grids using deep learning M Ashrafuzzaman, Y Chakhchoukh, AA Jillepalli, PT Tosic, DC de Leon, ... 2018 14th International Wireless Communications & Mobile Computing …, 2018 | 80 | 2018 |
Reliability measurement: From theory to practice FT Sheldon, KM Kavi, RC Tausworthe, JT Yu, R Brettschneider, ... IEEE Software 9 (4), 13-20, 1992 | 79 | 1992 |
A survey of crypto ransomware attack detection methodologies: an evolving outlook A Alqahtani, FT Sheldon Sensors 22 (5), 1837, 2022 | 77 | 2022 |
Quantifying security threats and their potential impacts: a case study AB Aissa, RK Abercrombie, FT Sheldon, A Mili Innovations in Systems and Software Engineering 6, 269-281, 2010 | 74 | 2010 |
IoT intrusion detection taxonomy, reference architecture, and analyses K Albulayhi, AA Smadi, FT Sheldon, RK Abercrombie Sensors 21 (19), 6432, 2021 | 72 | 2021 |
A methodology to evaluate agent oriented software engineering techniques CE Lin, KM Kavi, FT Sheldon, KM Daley, RK Abercrombie 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 72 | 2007 |
The insecurity of wireless networks FT Sheldon, JM Weber, SM Yoo, WD Pan IEEE Security & Privacy 10 (4), 54-61, 2012 | 62 | 2012 |
Isaac: The idaho cps smart grid cybersecurity testbed IA Oyewumi, AA Jillepalli, P Richardson, M Ashrafuzzaman, BK Johnson, ... 2019 IEEE Texas Power and Energy Conference (TPEC), 1-6, 2019 | 47 | 2019 |
Methodology for evaluating security controls based on key performance indicators and stakeholder mission FT Sheldon, RK Abercrombie, A Mili 2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009 | 46 | 2009 |
A short survey on quantum computers Y Kanamori, SM Yoo, WD Pan, FT Sheldon International Journal of Computers and Applications 28 (3), 227-233, 2006 | 46 | 2006 |
Empirical evaluation of the ensemble framework for feature selection in ddos attack S Das, D Venugopal, S Shiva, FT Sheldon 2020 7th IEEE International Conference on Cyber Security and Cloud Computing …, 2020 | 45 | 2020 |
Network intrusion detection and comparative analysis using ensemble machine learning and feature selection S Das, S Saha, AT Priyoti, EK Roy, FT Sheldon, A Haque, S Shiva IEEE transactions on network and service management 19 (4), 4821-4833, 2021 | 44 | 2021 |
Access control in fog computing: Challenges and research agenda MA Aleisa, A Abuhussein, FT Sheldon IEEE Access 8, 83986-83999, 2020 | 44 | 2020 |
A data integrity verification scheme in mobile cloud computing C Lin, Z Shen, Q Chen, FT Sheldon journal of Network and Computer Applications 77, 146-151, 2017 | 40 | 2017 |
Cyberspace security system RK Abercrombie, FT Sheldon, EM Ferragut US Patent 8,762,188, 2014 | 39 | 2014 |
Defining and computing a value based cyber-security measure AB Aissa, RK Abercrombie, FT Sheldon, A Mili Proceedings of the Second Kuwait Conference on e-Services and e-Systems, 1-9, 2011 | 39 | 2011 |