Adam J. Slagell

According to our database1, Adam J. Slagell authored at least 25 papers between 2004 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids.
IEEE Trans. Smart Grid, 2018

2016
Attacking supercomputers through targeted alteration of environmental control: A data driven case study.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
ISLET: an isolated, scalable, & lightweight environment for training.
Proceedings of the 2015 XSEDE Conference: Scientific Advancements Enabled by Enhanced Cyberinfrastructure, St. Louis, MO, USA, July 26, 2015

Towards an unified security testbed and security analytics framework.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Preemptive intrusion detection: theoretical framework and real-world measurements.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

2014
Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster).
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Personalized password guessing: a new security threat.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Preemptive intrusion detection.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

2013
Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol.
Proceedings of the Cyber Security and Information Intelligence, 2013

Semantic security analysis of SCADA networks to detect malicious control commands in power grids.
Proceedings of the SEGS'13, 2013

2009
A taxonomy and adversarial model for attacks against network log anonymization.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

2008
Evaluating the utility of anonymized network traces for intrusion detection.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

2007
Evaluating the Utility of Single Field Anonymization Polices by the IDS Metric : Towards measuring the trade off between Utility and Security
CoRR, 2007

2006
SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting
CoRR, 2006

Mithril: Adaptable Security for Survivability in Collaborative Computing Sites.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

<i>VisFlowCluster-IP</i>: Connectivity-Based Visual Clustering of Network Hosts.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs.
Proceedings of the 20th Conference on Systems Administration (LISA 2006), 2006

A survey of PKI components and scalability issues.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

2005
Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005

SELS: a secure e-mail list service.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005

Scalable Group Key Management with Partially Trusted Controllers.
Proceedings of the Networking, 2005

2004
Known-Plaintext Attack Against a Permutation Based Video.
IACR Cryptol. ePrint Arch., 2004

PKI Scalability Issues
CoRR, 2004

Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization
CoRR, 2004


  Loading...