Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Rayford B. Vaughn
@inproceedings{DBLP:conf/csiirw/VaughnM16, author = {Rayford B. Vaughn Jr. and Tommy H. Morris}, editor = {Joseph P. Trien and Stacy J. Prowell and John R. Goodall and Robert A. Bridges}, title = {Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity Simulation}, booktitle = {Proceedings of the 11th Annual Cyber and Information Security Research Conference, {CISRC} 2016, Oak Ridge, TN, USA, April 5-7, 2016}, pages = {12:1--12:4}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897795.2897819}, doi = {10.1145/2897795.2897819}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/VaughnM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ConklinVW16, author = {Wm. Arthur Conklin and Rayford B. Vaughn and Gregory B. White}, editor = {Tung X. Bui and Ralph H. Sprague Jr.}, title = {Introduction to the Cybersecurity Minitrack}, booktitle = {49th Hawaii International Conference on System Sciences, {HICSS} 2016, Koloa, HI, USA, January 5-8, 2016}, pages = {2615}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HICSS.2016.327}, doi = {10.1109/HICSS.2016.327}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/ConklinVW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/WhiteCV15, author = {Gregory B. White and Wm. Arthur Conklin and Rayford B. Vaughn}, editor = {Tung X. Bui and Ralph H. Sprague Jr.}, title = {Introduction to the E-government Secure Cyberspace in 21st Century Government Minitrack}, booktitle = {48th Hawaii International Conference on System Sciences, {HICSS} 2015, Kauai, Hawaii, USA, January 5-8, 2015}, pages = {2252}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HICSS.2015.269}, doi = {10.1109/HICSS.2015.269}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/WhiteCV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ConklinWV14, author = {Wm. Arthur Conklin and Gregory B. White and Rayford B. Vaughn}, title = {Introduction to Infrastructure Security Minitrack}, booktitle = {47th Hawaii International Conference on System Sciences, {HICSS} 2014, Waikoloa, HI, USA, January 6-9, 2014}, pages = {1986}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HICSS.2014.251}, doi = {10.1109/HICSS.2014.251}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/ConklinWV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/MorrisVS13, author = {Thomas H. Morris and Rayford B. Vaughn and Elena Sitnikova}, editor = {Clark D. Thomborson and Udaya Parampalli}, title = {Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security}, booktitle = {Eleventh Australasian Information Security Conference, {AISC} 2013, Adelaide, Australia, February 2013}, series = {{CRPIT}}, volume = {138}, pages = {67--76}, publisher = {Australian Computer Society}, year = {2013}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Morris.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/MorrisVS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/VaughnMS13, author = {Rayford B. Vaughn and Thomas H. Morris and Elena Sitnikova}, editor = {Frederick T. Sheldon and Annarita Giani and Axel W. Krings and Robert K. Abercrombie}, title = {Development {\&} expansion of an industrial control system security laboratory and an international research collaboration}, booktitle = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge, TN, USA, January 8-10, 2013}, pages = {18}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2459976.2459997}, doi = {10.1145/2459976.2459997}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/VaughnMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/VaughnCW13, author = {Rayford B. Vaughn Jr. and Wm. Arthur Conklin and Gregory B. White}, title = {Introduction to E-Government Infrastructure Security Minitrack}, booktitle = {46th Hawaii International Conference on System Sciences, {HICSS} 2013, Wailea, HI, USA, January 7-10, 2013}, pages = {1753}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/HICSS.2013.345}, doi = {10.1109/HICSS.2013.345}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/VaughnCW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/MorrisJVD13, author = {Thomas H. Morris and Bryan A. Jones and Rayford B. Vaughn and Yoginder S. Dandass}, title = {Deterministic Intrusion Detection Rules for {MODBUS} Protocols}, booktitle = {46th Hawaii International Conference on System Sciences, {HICSS} 2013, Wailea, HI, USA, January 7-10, 2013}, pages = {1773--1781}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/HICSS.2013.174}, doi = {10.1109/HICSS.2013.174}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/MorrisJVD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-8/SitnikovaFV13, author = {Elena Sitnikova and Ernest Foo and Rayford B. Vaughn}, editor = {Ronald C. Dodge Jr. and Lynn Futcher}, title = {The Power of Hands-On Exercises in {SCADA} Cyber Security Education}, booktitle = {Information Assurance and Security Education and Training - 8th {IFIP} {WG} 11.8 World Conference on Information Security Education, {WISE} 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, {WISE} 7, Lucerne Switzerland, June 9-10, 2011, and {WISE} 6, Bento Gon{\c{c}}alves, RS, Brazil, July 27-31, 2009, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {406}, pages = {83--94}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39377-8\_9}, doi = {10.1007/978-3-642-39377-8\_9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-8/SitnikovaFV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/MorrisVD12, author = {Thomas H. Morris and Rayford B. Vaughn and Yoginder S. Dandass}, title = {A Retrofit Network Intrusion Detection System for {MODBUS} {RTU} and {ASCII} Industrial Control Systems}, booktitle = {45th Hawaii International International Conference on Systems Science {(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui, HI, {USA}}, pages = {2338--2345}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/HICSS.2012.78}, doi = {10.1109/HICSS.2012.78}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/MorrisVD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/MorrisVD11, author = {Thomas H. Morris and Rayford B. Vaughn and Yoginder S. Dandass}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {A testbed for {SCADA} control system cybersecurity research and pedagogy}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {27}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179327}, doi = {10.1145/2179298.2179327}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/MorrisVD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/BogenDVRAC10, author = {Alfred C. Bogen and David A. Dampier and Rayford B. Vaughn and Donna S. Reese and Edward B. Allen and Jeffrey C. Carver}, title = {Structured Forensics Examination Planning with Domain Modeling: {A} Report of Three Experiment Trials}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {23--32}, year = {2010}, url = {https://doi.org/10.1080/15567280903376896}, doi = {10.1080/15567280903376896}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/BogenDVRAC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/HulittV10, author = {Elaine Hulitt and Rayford B. Vaughn}, title = {Information system security compliance to {FISMA} standard: a quantitative measure}, journal = {Telecommun. Syst.}, volume = {45}, number = {2-3}, pages = {139--152}, year = {2010}, url = {https://doi.org/10.1007/s11235-009-9248-8}, doi = {10.1007/S11235-009-9248-8}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/HulittV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isca/VaughnD09, author = {Rayford B. Vaughn and David A. Dampier}, title = {Outreach, Teaching and Research Facilitated by a Forensics Training Center in Direct Support of Public Safety and Criminal Justice}, journal = {Int. J. Comput. Their Appl.}, volume = {16}, number = {2}, pages = {105--110}, year = {2009}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isca/VaughnD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/McGrewV09, author = {Robert Wesley McGrew and Rayford B. Vaughn}, title = {Discovering vulnerabilities in control system human-machine interface software}, journal = {J. Syst. Softw.}, volume = {82}, number = {4}, pages = {583--589}, year = {2009}, url = {https://doi.org/10.1016/j.jss.2008.12.049}, doi = {10.1016/J.JSS.2008.12.049}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/McGrewV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/HulittV09, author = {Elaine Hulitt and Rayford B. Vaughn}, editor = {Steven Furnell and Nathan L. Clarke}, title = {Information System Security Compliance to {FISMA} Standard: {A} Quantitative Measure}, booktitle = {3rd International Conference on Human Aspects of Information Security and Assurance, {HAISA} 2009, Athens, Greece, June 25-26, 2009. Proceedings}, pages = {82--96}, publisher = {University of Plymouth}, year = {2009}, url = {http://www.cscan.org/openaccess/?paperid=57}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/haisa/HulittV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/VaughnD09, author = {Rayford B. Vaughn and David A. Dampier}, title = {A Discovery Learning Approach to Information Assurance Education}, booktitle = {42st Hawaii International International Conference on Systems Science {(HICSS-42} 2009), Proceedings {(CD-ROM} and online), 5-8 January 2009, Waikoloa, Big Island, HI, {USA}}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/HICSS.2009.10}, doi = {10.1109/HICSS.2009.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/VaughnD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/RileyDV08, author = {Jack Wesley Riley and David A. Dampier and Rayford B. Vaughn}, title = {A Comparison of Forensic Hard Drive Imagers: {A} Time Analysis Comparison Between the {ICS} Image MASSter-Solo {III} and the Logicube Talon}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {2}, pages = {74--82}, year = {2008}, url = {https://doi.org/10.1080/15567280802047143}, doi = {10.1080/15567280802047143}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/RileyDV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/RileyDV08, author = {Jack Wesley Riley and David A. Dampier and Rayford B. Vaughn}, editor = {Indrajit Ray and Sujeet Shenoi}, title = {Time Analysis of Hard Drive Imaging Tools}, booktitle = {Advances in Digital Forensics IV, Fourth Annual {IFIP} {WG} 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008}, series = {{IFIP}}, volume = {285}, pages = {335--344}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-84927-0\_26}, doi = {10.1007/978-0-387-84927-0\_26}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/RileyDV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imcsit/HulittV08, author = {Elaine Hulitt and Rayford B. Vaughn}, title = {Information system security compliance to {FISMA} standard: {A} quantitative measure}, booktitle = {Proceedings of the International Multiconference on Computer Science and Information Technology, {IMCSIT} 2008, Wisla, Poland, 20-22 October 2008}, pages = {799--806}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/IMCSIT.2008.4747334}, doi = {10.1109/IMCSIT.2008.4747334}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imcsit/HulittV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/Vaughn07, author = {Rayford B. Vaughn}, title = {Leadership by example: {A} perspective on the influence of Barry Boehm}, journal = {J. Syst. Softw.}, volume = {80}, number = {8}, pages = {1222--1226}, year = {2007}, url = {https://doi.org/10.1016/j.jss.2006.09.045}, doi = {10.1016/J.JSS.2006.09.045}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/Vaughn07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caine/SirajV07, author = {Ambareen Siraj and Rayford B. Vaughn}, editor = {Gongzhu Hu}, title = {Sensor Corroboration for Anomaly Sensors in an Intrusion Detection Environment}, booktitle = {Proceedings of the {ISCA} 20th International Conference on Computer Applications in Industry and Engineering, {CAINE} 2007, November 7-9, 2007, San Francisco, California, {USA}}, pages = {278--283}, publisher = {{ISCA}}, year = {2007}, timestamp = {Tue, 29 Jan 2008 07:45:48 +0100}, biburl = {https://dblp.org/rec/conf/caine/SirajV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caine/LiV07, author = {Wei Li and Rayford B. Vaughn}, editor = {Gongzhu Hu}, title = {Efficient Update on Exploitation Graphs for Vulnerability Analysis}, booktitle = {Proceedings of the {ISCA} 20th International Conference on Computer Applications in Industry and Engineering, {CAINE} 2007, November 7-9, 2007, San Francisco, California, {USA}}, pages = {295--300}, publisher = {{ISCA}}, year = {2007}, timestamp = {Mon, 28 Feb 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/caine/LiV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/VaughnD07, author = {Rayford B. Vaughn and David A. Dampier}, title = {Digital Forensics--State of the Science and Foundational Research Activity}, booktitle = {40th Hawaii International International Conference on Systems Science {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, {USA}}, pages = {263}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/HICSS.2007.174}, doi = {10.1109/HICSS.2007.174}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/VaughnD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/VaughnD07a, author = {Rayford B. Vaughn and David A. Dampier}, title = {The Development of a University-Based Forensics Training Center as a Regional Outreach and Service Activity}, booktitle = {40th Hawaii International International Conference on Systems Science {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, {USA}}, pages = {265}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/HICSS.2007.523}, doi = {10.1109/HICSS.2007.523}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/VaughnD07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/McRaeV07, author = {Craig M. McRae and Rayford B. Vaughn}, title = {Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks}, booktitle = {40th Hawaii International International Conference on Systems Science {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, {USA}}, pages = {270}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/HICSS.2007.435}, doi = {10.1109/HICSS.2007.435}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/McRaeV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/McGrewV07, author = {Robert McGrew and Rayford B. Vaughn}, editor = {Philip Craiger and Sujeet Shenoi}, title = {Using Search Engines to Acquire Network Forensic Evidence}, booktitle = {Advances in Digital Forensics {III} - {IFIP} International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007}, series = {{IFIP}}, volume = {242}, pages = {247--253}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73742-3\_17}, doi = {10.1007/978-0-387-73742-3\_17}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/McGrewV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/McRaeMV06, author = {Craig M. McRae and Robert Wesley McGrew and Rayford B. Vaughn}, title = {Honey Tokens and Web Bugs: Developing Reactive Techniques for Investigating Phishing Scams}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {3}, pages = {193--199}, year = {2006}, url = {https://doi.org/10.1080/15567280600995857}, doi = {10.1080/15567280600995857}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/McRaeMV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simulation/LiVD06, author = {Wei Li and Rayford B. Vaughn and Yoginder S. Dandass}, title = {An Approach to Model Network Exploitations Using Exploitation Graphs}, journal = {Simul.}, volume = {82}, number = {8}, pages = {523--541}, year = {2006}, url = {https://doi.org/10.1177/0037549706072046}, doi = {10.1177/0037549706072046}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/simulation/LiVD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/LiV06, author = {Wei Li and Rayford B. Vaughn}, title = {Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs}, booktitle = {Sixth {IEEE} International Symposium on Cluster Computing and the Grid (CCGrid 2006), 16-19 May 2006, Singapore}, pages = {26}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.ieeecomputersociety.org/10.1109/CCGRID.2006.128}, doi = {10.1109/CCGRID.2006.128}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/LiV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/MonroyV06, author = {Cesar Monroy and Rayford B. Vaughn}, editor = {Hamid R. Arabnia and Selim Aissi}, title = {Keeping An Educational Network Healthy: Differentiating Malicious And Naive Students On An Educational Network Environment}, booktitle = {Proceedings of the 2006 International Conference on Security {\&} Management, {SAM} 2006, Las Vegas, Nevada, USA, June 26-29, 2006}, pages = {475--481}, publisher = {{CSREA} Press}, year = {2006}, timestamp = {Wed, 06 Dec 2006 10:51:51 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/MonroyV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/LiV06, author = {Wei Li and Rayford B. Vaughn}, title = {Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering}, booktitle = {39th Hawaii International International Conference on Systems Science {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/HICSS.2006.353}, doi = {10.1109/HICSS.2006.353}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/LiV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/McGrewV06, author = {Robert McGrew and Rayford B. Vaughn}, title = {Experiences with Honeypot Systems: Development, Deployment, and Analysis}, booktitle = {39th Hawaii International International Conference on Systems Science {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/HICSS.2006.172}, doi = {10.1109/HICSS.2006.172}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/McGrewV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/serp/WilliamsCV06, author = {Byron J. Williams and Jeffrey C. Carver and Rayford B. Vaughn}, editor = {Hamid R. Arabnia and Hassan Reza}, title = {Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements}, booktitle = {Proceedings of the International Conference on Software Engineering Research and Practice {\&} Conference on Programming Languages and Compilers, {SERP} 2006, Las Vegas, Nevada, USA, June 26-29, 2006, Volume 2}, pages = {966--971}, publisher = {{CSREA} Press}, year = {2006}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/serp/WilliamsCV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/FlorezLBSV05, author = {German Florez and Zhen Liu and Susan M. Bridges and Anthony Skjellum and Rayford B. Vaughn}, title = {Lightweight monitoring of {MPI} programs in real time}, journal = {Concurr. Comput. Pract. Exp.}, volume = {17}, number = {13}, pages = {1547--1578}, year = {2005}, url = {https://doi.org/10.1002/cpe.889}, doi = {10.1002/CPE.889}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/FlorezLBSV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/KudikyalaV05, author = {Udai Kumar Kudikyala and Rayford B. Vaughn}, title = {Software requirement understanding using Pathfinder networks: discovering and evaluating mental models}, journal = {J. Syst. Softw.}, volume = {74}, number = {1}, pages = {101--108}, year = {2005}, url = {https://doi.org/10.1016/j.jss.2003.09.028}, doi = {10.1016/J.JSS.2003.09.028}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/KudikyalaV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SirajV05, author = {Ambareen Siraj and Rayford B. Vaughn}, editor = {Paul B. Kantor and Gheorghe Muresan and Fred S. Roberts and Daniel Dajun Zeng and Fei{-}Yue Wang and Hsinchun Chen and Ralph C. Merkle}, title = {A Cognitive Model for Alert Correlation in a Distributed Environment}, booktitle = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3495}, pages = {218--230}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11427995\_18}, doi = {10.1007/11427995\_18}, timestamp = {Fri, 18 Oct 2019 12:58:35 +0200}, biburl = {https://dblp.org/rec/conf/isi/SirajV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Florez-LarrahondoBV05, author = {German Florez{-}Larrahondo and Susan M. Bridges and Rayford B. Vaughn}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {506--514}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_38}, doi = {10.1007/11556992\_38}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/Florez-LarrahondoBV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/LiuBV05, author = {Zhen Liu and Susan M. Bridges and Rayford B. Vaughn}, title = {Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {164--177}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.6}, doi = {10.1109/IWIA.2005.6}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/LiuBV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitdm/SirajVB04, author = {Ambareen Siraj and Rayford B. Vaughn and Susan M. Bridges}, title = {Decision Making For Network Health Assessment In An Intelligent Intrusion Detection System Architecture}, journal = {Int. J. Inf. Technol. Decis. Mak.}, volume = {3}, number = {2}, pages = {281--306}, year = {2004}, url = {https://doi.org/10.1142/S0219622004001057}, doi = {10.1142/S0219622004001057}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijitdm/SirajVB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdim/FlorezLBVS04, author = {German Florez and Zhen Liu and Susan Bridges and Rayford B. Vaughn and Anthony Skjellum}, title = {Detecting Anomalies in High-Performance Parallel Programs}, journal = {J. Digit. Inf. Manag.}, volume = {2}, number = {2}, pages = {44--47}, year = {2004}, url = {http://www.dirf.org/jdim/abstractv2i2.htm\#1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdim/FlorezLBVS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/SirajVB04, author = {Ambareen Siraj and Rayford B. Vaughn and Susan Bridges}, title = {Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture}, booktitle = {37th Hawaii International Conference on System Sciences {(HICSS-37} 2004), {CD-ROM} / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/HICSS.2004.1265658}, doi = {10.1109/HICSS.2004.1265658}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/SirajVB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/FlorezLBVS04, author = {German Florez and Zhen Liu and Susan Bridges and Rayford B. Vaughn and Anthony Skjellum}, title = {Detecting Anomalies in High-Performance Parallel Programs}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {30--34}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286585}, doi = {10.1109/ITCC.2004.1286585}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/FlorezLBVS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Vaughn03, author = {Rayford B. Vaughn}, title = {Advances in the provisions of system and software security - Thirty years of progress}, journal = {Adv. Comput.}, volume = {58}, pages = {287--340}, year = {2003}, url = {https://doi.org/10.1016/S0065-2458(03)58007-X}, doi = {10.1016/S0065-2458(03)58007-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Vaughn03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fuzzIEEE/LiuBV03, author = {Zhen Liu and Susan M. Bridges and Rayford B. Vaughn}, title = {Classification of anomalous traces of privileged and parallel programs by neural networks}, booktitle = {The 12th {IEEE} International Conference on Fuzzy Systems, {FUZZ-IEEE} 2003, St. Louis, Missouri, USA, 25-28 May 2003}, pages = {1225--1230}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/FUZZ.2003.1206606}, doi = {10.1109/FUZZ.2003.1206606}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/fuzzIEEE/LiuBV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/VaughnHS03, author = {Rayford B. Vaughn and Ronda R. Henning and Ambareen Siraj}, title = {Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy}, booktitle = {36th Hawaii International Conference on System Sciences {(HICSS-36} 2003), {CD-ROM} / Abstracts Proceedings, January 6-9, 2003, Big Island, HI, {USA}}, pages = {331}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/HICSS.2003.1174904}, doi = {10.1109/HICSS.2003.1174904}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/VaughnHS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-8/Vaughn03, author = {Rayford B. Vaughn}, editor = {Cynthia E. Irvine and Helen L. Armstrong}, title = {Panel: Teaching Undergraduate Information Assurance}, booktitle = {Security Education and Critical Infrastructures, {IFIP} {TC11} / {WG11.8} Third Annual World Conference on Information Security Education (WISE3), June 26-28, 2003, Monterey, California, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {253}, pages = {173--174}, publisher = {Kluwer}, year = {2003}, timestamp = {Thu, 06 May 2004 14:39:20 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-8/Vaughn03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/HossainBV03, author = {Mahmood Hossain and Susan M. Bridges and Rayford B. Vaughn Jr.}, title = {Adaptive intrusion detection with data mining}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man {\&} Cybernetics: Washington, D.C., USA, 5-8 October 2003}, pages = {3097--3103}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ICSMC.2003.1244366}, doi = {10.1109/ICSMC.2003.1244366}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/smc/HossainBV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/VaughnHF02, author = {Rayford B. Vaughn and Ronda R. Henning and Kevin L. Fox}, title = {An empirical study of industrial security-engineering practices}, journal = {J. Syst. Softw.}, volume = {61}, number = {3}, pages = {225--232}, year = {2002}, url = {https://doi.org/10.1016/S0164-1212(01)00150-9}, doi = {10.1016/S0164-1212(01)00150-9}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/VaughnHF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csee/HislopLVU02, author = {Gregory W. Hislop and Michael J. Lutz and Rayford B. Vaughn and David A. Umphress}, title = {Panel 1: Changing Conditions for Undergraduate Software Engineering Programs}, booktitle = {15th Conference on Software Engineering Education and Training (CSEET'02), 25-27 February 2002, Covington, Kentucky, {USA}}, pages = {250--251}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSEE.2002.995217}, doi = {10.1109/CSEE.2002.995217}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csee/HislopLVU02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csedu/Vaughn01, author = {Rayford B. Vaughn}, title = {Teaching Industrial Practices in an Undergraduate Software Engineering Course}, journal = {Comput. Sci. Educ.}, volume = {11}, number = {1}, pages = {21--32}, year = {2001}, url = {https://doi.org/10.1076/csed.11.1.21.3844}, doi = {10.1076/CSED.11.1.21.3844}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csedu/Vaughn01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csee/Vaughn00, author = {Rayford B. Vaughn}, title = {A Report on Industrial Transfer of Software Engineering to the Classroom Environment}, booktitle = {Thirteenth Conference on Software Engineering Education and Training, 6-8 March, 2000, Austin, Texas, {USA}}, pages = {15--22}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/CSEE.2000.827013}, doi = {10.1109/CSEE.2000.827013}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csee/Vaughn00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/Vaughn00, author = {Rayford B. Vaughn}, editor = {Lillian (Boots) Cassel and Nell B. Dale and Henry MacKay Walker and Susan M. Haller}, title = {Application of security tot he computing science classroom}, booktitle = {Proceedings of the 31st {SIGCSE} Technical Symposium on Computer Science Education, {SIGCSE} 2000, Austin, Texas, USA, March 7-12, 2000}, pages = {90--94}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/330908.331822}, doi = {10.1145/330908.331822}, timestamp = {Tue, 23 Mar 2021 10:54:19 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/Vaughn00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/VaughnB99, author = {Rayford B. Vaughn and Julian E. Boggess III}, title = {Integration of computer security into the software engineering and computer science programs}, journal = {J. Syst. Softw.}, volume = {49}, number = {2-3}, pages = {149--153}, year = {1999}, url = {https://doi.org/10.1016/S0164-1212(99)00088-6}, doi = {10.1016/S0164-1212(99)00088-6}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/VaughnB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BurnhamIRSV99, author = {Ron Ross and Cynthia E. Irvine and Charles Reynolds and Ravi S. Sandhu and Blaine Burnham and Rayford B. Vaughn}, title = {Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum)}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {265}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.ieeecomputersociety.org/10.1109/ACSAC.1999.10007}, doi = {10.1109/ACSAC.1999.10007}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BurnhamIRSV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/VaughnSU94, author = {Rayford B. Vaughn and Hossein Saiedian and Elizabeth A. Unger}, title = {A Proposed Mechanism for Implementation of Non-Discretionary Access Controls in a Network Environment}, journal = {Comput. Networks {ISDN} Syst.}, volume = {26}, number = {12}, pages = {1523--1531}, year = {1994}, url = {https://doi.org/10.1016/0169-7552(94)90026-4}, doi = {10.1016/0169-7552(94)90026-4}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/VaughnSU94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VaughnSU93, author = {Rayford B. Vaughn and Hossein Saiedian and Elizabeth A. Unger}, title = {A survey of security issues in office computation and the application of secure computing models to office systems}, journal = {Comput. Secur.}, volume = {12}, number = {1}, pages = {79--97}, year = {1993}, url = {https://doi.org/10.1016/0167-4048(93)90014-V}, doi = {10.1016/0167-4048(93)90014-V}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VaughnSU93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.