Daniel Conte de Leon

Orcid: 0000-0002-9857-3370

According to our database1, Daniel Conte de Leon authored at least 27 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
MACH-T: A Behavior-based Mobile Node Trust Evaluation Algorithm.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Customizing OWASP ZAP: A Proven Method for Detecting SQL Injection Vulnerabilities.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

2022
A Formal Model and Verification for HESTIA: An Automated, Adversary-Aware Risk Assessment Process for Cyber Infrastructure.
IEEE Access, 2022

A Systematic Literature Review on the Characteristics and Effectiveness of Web Application Vulnerability Scanners.
IEEE Access, 2022

HESPIDS: A Hierarchical and Extensible System for Process Injection Detection using Sysmon.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Introduction to the Minitrack on Organizational Cybersecurity: Advanced Cyber Defense, Cyber Analytics, and Security Operations.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
MAHIVE: Modular Analysis Hierarchical Intrusion Detection System Visualization Event Cybersecurity Engine for Cyber-Physical Systems and Internet of Things Devices.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Introduction to the Minitrack on Organizational Cybersecurity: Advanced Cyber Defense, Cyber Analytics, and Security.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2019
MACH-2K Architecture: Building Mobile Device Trust and Utility for Emergency Response Networks.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019

2018
Analysis of Web Browser Security Configuration Options.
KSII Trans. Internet Inf. Syst., 2018

ADLES: Specifying, deploying, and sharing hands-on cyber-exercises.
Comput. Secur., 2018

METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

HESTIA: Adversarial Modeling and Risk Assessment for CPCS.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Detecting Stealthy False Data Injection Attacks in Power Grids Using Deep Learning.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

The Healthcare IoT Ecosystem: Advantages of Fog Computing Near the Edge.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

2017
Security management of cyber physical control systems using NIST SP 800-82r2.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

A Structured Analysis of SQL Injection Runtime Mitigation Techniques.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Hardening the Client-Side: A Guide to Enterprise-Level Hardening of Web Browsers.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
Using a knowledge-based security orchestration tool to reduce the risk of browser compromise.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

HERMES: A high-level policy language for high-granularity enterprise-wide secure browser configuration management.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

Requirements are the New Code.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

An Architecture for a Policy-Oriented Web Browser Management System: HiFiPol: Browser.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2008
Formal Verification and Visualization of Security Policies.
J. Comput., 2008

2007
Implementation-Oriented Secure Architectures.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
Hidden Implementation Dependencies in High Assurance and Critical Computing Systems.
IEEE Trans. Software Eng., 2006

2004
Experiments on Processing and Linking Semantically Augmented Requirement Specifications.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2002
Experiments in the Use of XML to Enhance Traceability between Object-Oriented Design Specifications and Source Code.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002


  Loading...