关注
Robert Abercrombie
Robert Abercrombie
Prime Time Computing, LLC
在 ieee.org 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Quantifying security threats and their potential impacts: a case study
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Innovations in Systems and Software Engineering 6, 269-281, 2010
742010
IoT intrusion detection taxonomy, reference architecture, and analyses
K Albulayhi, AA Smadi, FT Sheldon, RK Abercrombie
Sensors 21 (19), 6432, 2021
722021
A methodology to evaluate agent oriented software engineering techniques
CE Lin, KM Kavi, FT Sheldon, KM Daley, RK Abercrombie
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
692007
A study of scientometric methods to identify emerging technologies via modeling of milestones
RK Abercrombie, AW Udoeyop, BG Schlicher
Scientometrics 91 (2), 327-342, 2012
502012
Methodology for evaluating security controls based on key performance indicators and stakeholder mission
FT Sheldon, RK Abercrombie, A Mili
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
462009
Cyberspace security system
RK Abercrombie, FT Sheldon, EM Ferragut
US Patent 8,762,188, 2014
392014
Defining and computing a value based cyber-security measure
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Proceedings of the Second Kuwait Conference on e-Services and e-Systems, 1-9, 2011
392011
Method and system for determining a volume of an object from two-dimensional images
RK Abercrombie, BG Schlicher
US Patent 7,773,773, 2010
392010
Risk assessment for industrial control systems quantifying availability using mean failure cost (MFC)
Q Chen, RK Abercrombie, FT Sheldon
Journal of Artificial Intelligence and Soft Computing Research 5 (3), 205-220, 2015
362015
System and method for identifying, validating, weighing and characterizing moving or stationary vehicles and cargo
DL Beshears, SG Batsell, RK Abercrombie, MB Scudiere, CP White
US Patent 7,305,324, 2007
342007
Risk assessment methodology based on the NISTIR 7628 guidelines
RK Abercrombie, FT Sheldon, KR Hauser, MW Lantz, A Mili
2013 46th Hawaii International Conference on System Sciences, 1802-1811, 2013
332013
Security management of cyber physical control systems using NIST SP 800-82r2
AA Jillepalli, FT Sheldon, DC de Leon, M Haney, RK Abercrombie
2017 13th International Wireless Communications and Mobile Computing …, 2017
322017
Evaluating security controls based on key performance indicators and stakeholder mission
FT Sheldon, RK Abercrombie, A Mili
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
302008
Managing complex IT security processes with value based measures
RK Abercrombie, FT Sheldon, A Mili
2009 IEEE Symposium on Computational Intelligence in Cyber Security, 69-75, 2009
232009
OPNET/simulink based testbed for disturbance detection in the smart grid
MAH Sadi, MH Ali, D Dasgupta, RK Abercrombie
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
222015
Synopsis of evaluating security controls based on key performance indicators and stakeholder mission value
RK Abercrombie, FT Sheldon, A Mili
2008 11th IEEE High Assurance Systems Engineering Symposium, 479-482, 2008
202008
System and method for implementing and monitoring a cyberspace security econometrics system and other complex systems
RK Abercrombie, FT Sheldon, A Mili
US Patent App. 12/421,933, 2009
182009
Co-simulation platform for characterizing cyber attacks in cyber physical systems
MAH Sadi, MH Ali, D Dasgupta, RK Abercrombie, S Kher
2015 IEEE Symposium Series on Computational Intelligence, 1244-1251, 2015
172015
Security analysis of selected AMI failure scenarios using agent based game theoretic simulation
RK Abercrombie, BG Schlicher, FT Sheldon
2014 47th Hawaii international conference on system sciences, 2015-2024, 2014
172014
Towards reducing the data exfiltration surface for the insider threat
BG Schlicher, LP MacIntyre, RK Abercrombie
2016 49th Hawaii International Conference on System Sciences (HICSS), 2749-2758, 2016
152016
系统目前无法执行此操作,请稍后再试。
文章 1–20