Factors in an end user security expertise instrument P Rajivan, P Moriano, T Kelley, LJ Camp Information & Computer Security 25 (2), 190-205, 2017 | 69 | 2017 |
Addressing the lack of comparability & testing in CAN intrusion detection research: A comprehensive guide to CAN IDS data & introduction of the ROAD dataset ME Verma, MD Iannacone, RA Bridges, SC Hollifield, P Moriano, B Kay, ... arXiv preprint arXiv:2012.14600, 2020 | 39 | 2020 |
Insider threat event detection in user-system interactions P Moriano, J Pendleton, S Rich, LJ Camp Proceedings of the 2017 International Workshop on Managing Insider Security …, 2017 | 30 | 2017 |
Community-based event detection in temporal networks P Moriano, J Finke, YY Ahn Scientific reports 9 (1), 4358, 2019 | 22 | 2019 |
Using bursty announcements for detecting BGP routing anomalies P Moriano, R Hill, LJ Camp Computer Networks 188, 107835, 2021 | 20 | 2021 |
Time-based can intrusion detection benchmark DH Blevins, P Moriano, RA Bridges, ME Verma, MD Iannacone, ... arXiv preprint arXiv:2101.05781, 2021 | 19 | 2021 |
On the formation of structure in growing networks P Moriano, J Finke Journal of Statistical Mechanics: Theory and Experiment 2013 (06), P06010, 2013 | 18 | 2013 |
Modelado y control de un nuevo sistema bola viga con levitación magnética P Moriano, F Naranjo Revista iberoamericana de automática e informática industrial 9 (3), 249-258, 2012 | 16 | 2012 |
Lessons learnt from comparing {WhatsApp} privacy concerns across saudi and indian populations J Dev, P Moriano, LJ Camp Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 81-97, 2020 | 15 | 2020 |
Stopping the Insider at the Gates: Protecting Organizational Assets through Graph Mining. P Moriano, J Pendleton, S Rich, LJ Camp J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (1), 4-29, 2018 | 11 | 2018 |
What Can Johnny Do?–Factors in an End-User Expertise Instrument. P Rajivan, P Moriano, T Kelley, LJ Camp HAISA, 199-208, 2016 | 11 | 2016 |
Graph-based machine learning improves just-in-time defect prediction J Bryan, P Moriano Plos one 18 (4), e0284077, 2023 | 8 | 2023 |
Detecting can masquerade attacks with signal clustering similarity P Moriano, RA Bridges, MD Iannacone arXiv preprint arXiv:2201.02665, 2022 | 8 | 2022 |
Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies P Moriano, S Achar, LJ Camp Computers & Security 70, 319-334, 2017 | 8 | 2017 |
Power-law weighted networks from local attachments P Moriano, J Finke Europhysics Letters 99 (1), 18002, 2012 | 7 | 2012 |
Dissemination of scholarly literature in social media P Moriano, E Ferrara, A Flammini, F Menczer Altmetric. org, 2014 | 6 | 2014 |
CANShield: Deep Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal-Level MH Shahriar, Y Xiao, P Moriano, W Lou, YT Hou IEEE Internet of Things Journal, 2023 | 5 | 2023 |
Canshield: Signal-based intrusion detection for controller area networks MH Shahriar, Y Xiao, P Moriano, W Lou, YT Hou arXiv preprint arXiv:2205.01306, 2022 | 5 | 2022 |
Data Reduction. R Zhang, A Malviya-Thakur, J Borreguero, P Peterson, R Whitfield, ... Encyclopedia of Database Systems, 621-626, 2009 | 5 | 2009 |
Anomaly detection in real-world temporal networks PM Salazar Indiana University, 2019 | 4 | 2019 |