Brian Hay

According to our database1, Brian Hay authored at least 32 papers between 2004 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Towards Thwarting Social Engineering Attacks.
CoRR, 2019

Cyber Deception Architecture: Covert Attack Reconnaissance Using a Safe SDN Approach.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2016
Capture the Flag as Cyber Security Introduction.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Introduction to CyberWarfare: Offensive and Defensive Software Technologies Minitrack.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2014
Using Memory Map Timings to Discover Information Leakage to a Live VM from the Hypervisor.
Proceedings of the 2014 IEEE World Congress on Services, 2014

Teaching Digital Forensics Techniques within Linux Environments.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Hands-on cybersecurity exercises and the rave virtual environment (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Automated Honeynet Deployment for Dynamic Network Environment.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Introduction to Virtualization: Environments, Research, and Education Minitrack.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
Circumventing cryptography in virtualized environments.
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012

Are Your Papers in Order? Developing and Enforcing Multi-tenancy and Migration Policies in the Cloud.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
A Mutualistic Security Service Model: Supporting Large-Scale Virtualized Environments.
IT Prof., 2011

Creating Shareable Security Modules.
Proceedings of the Information Assurance and Security Education and Training, 2011

Storm Clouds Rising: Security Challenges for IaaS Cloud Computing.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Applying Formal Methods Informally.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
The PATH Project: Partnerships for Automated Transformations of Heterogeneous Datasets.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Securing E-Government Assets through Automating Deployment of Honeynets for IDS Support.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Applications of Virtualization to Digital Forensics Education.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Live Analysis: Progress and Challenges.
IEEE Secur. Priv., 2009

Replicating and Sharing Computer Security Laboratory Environments.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Digital Forensics: Defining a Research Agenda.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Investigating the Implications of Virtual Machine Introspection for Digital Forensics.
Proceedings of the The Forth International Conference on Availability, 2009

Standards-Based Cyber Exercises.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Virtualization and Digital Forensics: A Research and Education Agenda.
J. Digit. Forensic Pract., 2008

Virtual Machine Introspection: Observation or Interference?
IEEE Secur. Priv., 2008

Using Virtualization to Create and Deploy Computer Security Lab Exercises.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

2007
Certifying the Computer Security Professional Using the Project Management Institute's PMP Model.
Proceedings of the New Approaches for Security, 2007

Promoting Digital Forensics Awareness through the University of Alaska Fairbanks ASSERT Center.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2005
Automatic transformations between geoscience standards using XML.
Comput. Geosci., 2005

Trust Requirements in Identity Management.
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005

2004
Automating javascript-based test creation for client-side online testing.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004


  Loading...