Priority-based assignment and routing of a fleet of unmanned combat aerial vehicles VK Shetty, M Sudit, R Nagi Computers & Operations Research 35 (6), 1813-1828, 2008 | 200 | 2008 |
Cyber attack modeling and simulation for network security analysis ME Kuhl, M Sudit, J Kistner, K Costantini 2007 Winter Simulation Conference, 1180-1188, 2007 | 149 | 2007 |
High level information fusion for tracking and projection of multistage cyber attacks SJ Yang, A Stotz, J Holsopple, M Sudit, M Kuhl Information Fusion 10 (1), 107-121, 2009 | 113 | 2009 |
Data mining in an engineering design environment: OR applications from graph matching CJ Romanowski, R Nagi, M Sudit Computers & operations research 33 (11), 3150-3160, 2006 | 68 | 2006 |
INformation fusion engine for real-time decision-making (INFERD): A perceptual system for cyber attack tracking A Stotz, M Sudit 2007 10th International Conference on Information Fusion, 1-8, 2007 | 63 | 2007 |
TANDI: Threat assessment of network data and information J Holsopple, SJ Yang, M Sudit Multisensor, Multisource Information Fusion: Architectures, Algorithms, and …, 2006 | 63 | 2006 |
Situational awareness of a coordinated cyber attack M Sudit, A Stotz, M Holender Data Mining, Intrusion Detection, Information Assurance, and Data Networks …, 2005 | 57 | 2005 |
Enhancements to high level data fusion using graph matching and state space search K Sambhoos, R Nagi, M Sudit, A Stotz Information Fusion 11 (4), 351-364, 2010 | 52 | 2010 |
Attack projection SJ Yang, H Du, J Holsopple, M Sudit Cyber Defense and Situational Awareness, 239-261, 2014 | 51 | 2014 |
Enhancing situation awareness via automated situation assessment J Holsopple, M Sudit, M Nusinov, DF Liu, H Du, SJ Yang IEEE Communications Magazine 48 (3), 146-152, 2010 | 49 | 2010 |
Understanding multistage attacks by attack-track based visualization of heterogeneous event streams S Mathew, R Giomundo, S Upadhyaya, M Sudit, A Stotz Proceedings of the 3rd international workshop on Visualization for computer …, 2006 | 46 | 2006 |
Real-time multistage attack awareness through enhanced intrusion alert clustering S Mathew, D Britt, R Giomundo, S Upadhyaya, M Sudit, A Stotz MILCOM 2005-2005 IEEE Military Communications Conference, 1801-1806, 2005 | 39 | 2005 |
Issues and challenges in higher level fusion: Threat/impact assessment and intent modeling (a panel summary) JJ Salerno, SJ Yang, I Kadar, M Sudit, GP Tadda, J Holsopple 2010 13th International Conference on Information Fusion, 1-17, 2010 | 35 | 2010 |
Incremental graph matching for situation awareness A Stotz, R Nagi, M Sudit 2009 12th International Conference on Information Fusion, 452-459, 2009 | 35 | 2009 |
Evaluating threat assessment for multi-stage cyber attacks SJ Yang, J Holsopple, M Sudit MILCOM 2006-2006 IEEE Military Communications conference, 1-7, 2006 | 35 | 2006 |
Pedigree information for enhanced situation and threat assessment MG Ceruti, S Das, A Ashenfelter, G Raven, R Brooks, M Sudit, G Chen, ... 2006 9th International Conference on Information Fusion, 1-8, 2006 | 35 | 2006 |
The graph association problem: mathematical models and a Lagrangian heuristic G Tauer, R Nagi, M Sudit Naval Research Logistics (NRL) 60 (3), 251-268, 2013 | 28 | 2013 |
Discovering patterns in social networks with graph matching algorithms K Ogaard, H Roy, S Kase, R Nagi, K Sambhoos, M Sudit Social Computing, Behavioral-Cultural Modeling and Prediction: 6th …, 2013 | 28 | 2013 |
Improving event co-reference by context extraction and dynamic feature weighting K McConky, R Nagi, M Sudit, W Hughes 2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods …, 2012 | 24 | 2012 |
Situation awareness of multistage cyber attacks by semantic event fusion S Mathew, S Upadhyaya, M Sudit, A Stotz 2010-MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 1286-1291, 2010 | 23 | 2010 |