Quantifying security threats and their potential impacts: a case study AB Aissa, RK Abercrombie, FT Sheldon, A Mili Innovations in Systems and Software Engineering 6, 269-281, 2010 | 74 | 2010 |
IoT intrusion detection taxonomy, reference architecture, and analyses K Albulayhi, AA Smadi, FT Sheldon, RK Abercrombie Sensors 21 (19), 6432, 2021 | 72 | 2021 |
A methodology to evaluate agent oriented software engineering techniques CE Lin, KM Kavi, FT Sheldon, KM Daley, RK Abercrombie 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 69 | 2007 |
A study of scientometric methods to identify emerging technologies via modeling of milestones RK Abercrombie, AW Udoeyop, BG Schlicher Scientometrics 91 (2), 327-342, 2012 | 50 | 2012 |
Methodology for evaluating security controls based on key performance indicators and stakeholder mission FT Sheldon, RK Abercrombie, A Mili 2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009 | 46 | 2009 |
Cyberspace security system RK Abercrombie, FT Sheldon, EM Ferragut US Patent 8,762,188, 2014 | 39 | 2014 |
Defining and computing a value based cyber-security measure AB Aissa, RK Abercrombie, FT Sheldon, A Mili Proceedings of the Second Kuwait Conference on e-Services and e-Systems, 1-9, 2011 | 39 | 2011 |
Method and system for determining a volume of an object from two-dimensional images RK Abercrombie, BG Schlicher US Patent 7,773,773, 2010 | 39 | 2010 |
Risk assessment for industrial control systems quantifying availability using mean failure cost (MFC) Q Chen, RK Abercrombie, FT Sheldon Journal of Artificial Intelligence and Soft Computing Research 5 (3), 205-220, 2015 | 36 | 2015 |
System and method for identifying, validating, weighing and characterizing moving or stationary vehicles and cargo DL Beshears, SG Batsell, RK Abercrombie, MB Scudiere, CP White US Patent 7,305,324, 2007 | 34 | 2007 |
Risk assessment methodology based on the NISTIR 7628 guidelines RK Abercrombie, FT Sheldon, KR Hauser, MW Lantz, A Mili 2013 46th Hawaii International Conference on System Sciences, 1802-1811, 2013 | 33 | 2013 |
Security management of cyber physical control systems using NIST SP 800-82r2 AA Jillepalli, FT Sheldon, DC de Leon, M Haney, RK Abercrombie 2017 13th International Wireless Communications and Mobile Computing …, 2017 | 32 | 2017 |
Evaluating security controls based on key performance indicators and stakeholder mission FT Sheldon, RK Abercrombie, A Mili Proceedings of the 4th annual workshop on Cyber security and information …, 2008 | 30 | 2008 |
Managing complex IT security processes with value based measures RK Abercrombie, FT Sheldon, A Mili 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 69-75, 2009 | 23 | 2009 |
OPNET/simulink based testbed for disturbance detection in the smart grid MAH Sadi, MH Ali, D Dasgupta, RK Abercrombie Proceedings of the 10th Annual Cyber and Information Security Research …, 2015 | 22 | 2015 |
Synopsis of evaluating security controls based on key performance indicators and stakeholder mission value RK Abercrombie, FT Sheldon, A Mili 2008 11th IEEE High Assurance Systems Engineering Symposium, 479-482, 2008 | 20 | 2008 |
System and method for implementing and monitoring a cyberspace security econometrics system and other complex systems RK Abercrombie, FT Sheldon, A Mili US Patent App. 12/421,933, 2009 | 18 | 2009 |
Co-simulation platform for characterizing cyber attacks in cyber physical systems MAH Sadi, MH Ali, D Dasgupta, RK Abercrombie, S Kher 2015 IEEE Symposium Series on Computational Intelligence, 1244-1251, 2015 | 17 | 2015 |
Security analysis of selected AMI failure scenarios using agent based game theoretic simulation RK Abercrombie, BG Schlicher, FT Sheldon 2014 47th Hawaii international conference on system sciences, 2015-2024, 2014 | 17 | 2014 |
Towards reducing the data exfiltration surface for the insider threat BG Schlicher, LP MacIntyre, RK Abercrombie 2016 49th Hawaii International Conference on System Sciences (HICSS), 2749-2758, 2016 | 15 | 2016 |