Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Robust and Extensible Automatic Protocol Identification., , , and . International Conference on Internet Computing, page 104-108. CSREA Press, (2009)On fostering a culture of research cyberinfrastructure grant proposals within a community of service providers in an EPSCoR state., , , , , , , , , and 5 other author(s). XSEDE, page 19:1-19:8. ACM, (2015)Hybrid extensions for stateful attack graphs., , , , and . CISR, page 101-104. ACM, (2014)Practical Cyber-Security Solutions for the Science DMZ., , , and . PEARC, page 50:1-50:6. ACM, (2019)The OneOklahoma Friction Free Network: Towards a Multi-Institutional Science DMZ in an EPSCoR State., , , , , , , , , and 5 other author(s). XSEDE, page 49:1-49:8. ACM, (2014)The Blunderdome: An Offensive Exercise for Building Network, Systems, and Web Security Awareness., , , and . CSET, USENIX Association, (2010)Techniques for attack graph visualization and interaction., , and . CSIIRW, page 74. ACM, (2011)Toward hybrid attack dependency graphs., , , and . CSIIRW, page 62. ACM, (2011)Toward sensitive information redaction in a collaborative, multilevel security environment., , , and . Int. Sym. Wikis, ACM, (2010)Content-based alternatives to conventional network monitoring systems., , , and . CSIIRW, page 67. ACM, (2009)