SCIBORG: Secure configurations for the IoT based on optimization and reasoning on graphs H Soroush, M Albanese, MA Mehrabadi, I Iganibo, M Mosko, JH Gao, ... 2020 IEEE Conference on Communications and Network Security (CNS), 1-10, 2020 | 9 | 2020 |
Vulnerability Metrics for Graph-based Configuration Security I Iganibo, M Albanese, M Mosko, E Bier, AE Brito In Proceedings of the 18th International Conference on Security and …, 2021 | 4 | 2021 |
A framework for designing vulnerability metrics M Albanese, I Iganibo, O Adebiyi Computers & Security 132, 103382, 2023 | 3 | 2023 |
An attack volume metric I Iganibo, M Albanese, M Mosko, E Bier, AE Brito Security and Privacy 6 (4), e298, 2023 | 3 | 2023 |
Mason Vulnerability Scoring Framework: A Customizable Framework for Scoring Common Vulnerabilities and Weaknesses I Ibifubara, A Massimiliano, T Kaan, C Thomas, M Marc Proceedings of the 19th International Conference on Security and …, 2022 | 3* | 2022 |
A Digital Body Farm for collecting Deleted File Decay Data OC Agada, I Iganibo, J Jones, K Fairbanks IFIP International Conference on Digital Forensics, 3-20, 2022 | 2 | 2022 |
Method and system for calculating multi-dimensional metrics through a system of dependencies ME Mosko, M Albanese, I Iganibo US Patent App. 18/071,431, 2023 | | 2023 |
Method and system for facilitating a ranking score using attack volume to find optimal configurations M Albanese, I Iganibo, ME Mosko, AE Brito US Patent App. 17/831,848, 2023 | | 2023 |