Frederick T. Sheldon

Orcid: 0000-0003-1241-2750

According to our database1, Frederick T. Sheldon authored at least 118 papers between 1992 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
eMIFS: A Normalized Hyperbolic Ransomware Deterrence Model Yielding Greater Accuracy and Overall Performance.
Sensors, March, 2024

Ensembling Supervised and Unsupervised Machine Learning Algorithms for Detecting Distributed Denial of Service Attacks.
Algorithms, March, 2024

Trusting Classifiers with Interpretable Machine Learning Based Feature Selection Backpropagation.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024

2023
Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems.
Future Internet, April, 2023

Systematic Review of Recommendation Systems for Course Selection.
Mach. Learn. Knowl. Extr., March, 2023

Temporal Data Correlation Providing Enhanced Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation.
Sensors, 2023

An Enhanced Minimax Loss Function Technique in Generative Adversarial Network for Ransomware Behavior Prediction.
Future Internet, 2023

2022
Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection.
IEEE Trans. Netw. Serv. Manag., December, 2022

A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook.
Sensors, 2022

Adaptive IDS for Cooperative Intelligent Transportation Systems Using Deep Belief Networks.
Algorithms, 2022

A Formal Model and Verification for HESTIA: An Automated, Adversary-Aware Risk Assessment Process for Cyber Infrastructure.
IEEE Access, 2022

Disrupting the Cooperative Nature of Intelligent Transportation Systems.
Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), 2022

2021
Examining the Performance of Fog-Aided, Cloud-Centered IoT in a Real-World Environment.
Sensors, 2021

IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses.
Sensors, 2021

Validation of VANET message dissemination algorithms otherwise vulnerable to broadcast storms in urban contexts.
Trans. Emerg. Telecommun. Technol., 2021

Key Factors Influencing the Rise of Current Ransomware Attacks on Industrial Control Systems.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

An Adaptive Deep-Ensemble Anomaly-Based Intrusion Detection System for the Internet of Things.
Proceedings of the IEEE World AI IoT Congress, 2021

2020
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning.
Comput. Secur., 2020

Access Control in Fog Computing: Challenges and Research Agenda.
IEEE Access, 2020

Voice Feature Learning using Convolutional Neural Networks Designed to Avoid Replay Attacks.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Taxonomy and Survey of Interpretable Machine Learning Method.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Network Intrusion Detection using Natural Language Processing and Ensemble Machine Learning.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Elliptic Envelope Based Detection of Stealthy False Data Injection Attacks in Smart Grid Control Systems.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Trusted Security Model for IDS Using Deep Learning.
Proceedings of the 3rd International Conference on Signal Processing and Information Security, 2020

Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

Performance Analysis of Two Cloud-Based IoT Implementations: Empirical Study.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

G-Model: A Novel Approach to Privacy-Preserving 1: M Microdata Publication.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

A proposed Crypto-Ransomware Early Detection(CRED) Model using an Integrated Deep Learning and Vector Space Model Approach.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

Fine-Grained Access Control in the Era of Cloud Computing: An Analytical Review.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

2019
Microgrid Disaster Resiliency Analysis: Reducing Costs in Continuity of Operations (COOP) Planning.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

HESTIA: Adversarial Modeling and Risk Assessment for CPCS.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Detecting Stealthy False Data Injection Attacks in Power Grids Using Deep Learning.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Authoring Adaptive Digital Computational Thinking Lessons Using vTutor for Web-Based Learning.
Proceedings of the Advances in Web-Based Learning - ICWL 2018, 2018

A Best-Effort Damage Mitigation Model for Cyber-Attacks on Smart Grids.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
A data integrity verification scheme in mobile cloud computing.
J. Netw. Comput. Appl., 2017

A virtual testbed for security management of industrial control systems.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Security management of cyber physical control systems using NIST SP 800-82r2.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Introduction to Supply Chain Security and Mutual Trust Research Minitrack.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Hardening the Client-Side: A Guide to Enterprise-Level Hardening of Web Browsers.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
Model-based autonomic security management for cyber-physical infrastructures.
Int. J. Crit. Infrastructures, 2016

Using a knowledge-based security orchestration tool to reduce the risk of browser compromise.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

HERMES: A high-level policy language for high-granularity enterprise-wide secure browser configuration management.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

CSSR: Cloud Services Security Recommender.
Proceedings of the IEEE World Congress on Services, 2016

Evaluating Security and Privacy in Cloud Services.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Risk Assessment For Industrial Control Systems Quantifying Availability Using Mean Failure Cost (MFC).
J. Artif. Intell. Soft Comput. Res., 2015

Security Analysis of Smart Grid Cyber Physical Infrastructures Using Game Theoretic Simulation.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015

Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

2014
Security Analysis of Selected AMI Failure Scenarios Using Agent Based Game Theoretic Simulation.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Quantifying availability in SCADA environments using the cyber security metric MFC.
Proceedings of the Cyber and Information Security Research Conference, 2014

Improving Cyber Resiliency of Cloud Application Services by Applying Software Behavior Encryption (SBE).
Proceedings of the Conference on Systems Engineering Research, 2014

Quantifying the impact of unavailability in cyber-physical environments.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014

2013
Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment.
Proceedings of the ISSE 2013, 2013

Risk Assessment Methodology Based on the NISTIR 7628 Guidelines.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructure.
Proceedings of the Cyber Security and Information Intelligence, 2013

Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA).
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
Introduction to the special issue on cyber security and management.
Inf. Syst. E Bus. Manag., 2012

Defining and computing a value based cyber-security measure.
Inf. Syst. E Bus. Manag., 2012

The Insecurity of Wireless Networks.
IEEE Secur. Priv., 2012

Intrinsically Resilient Energy Control Systems.
Proceedings of the Seventh International Conference on Semantic Technologies for Intelligence, 2012

2011
Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor.
IEEE Secur. Priv., 2011

Validating Cyber Security Requirements: A Case Study.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Has the cyber warfare threat been overstated?: a cheap talk game-theoretic analysis on the Google-hacking claim?
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Anomaly detection in multiple scale for insider threat analysis.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Secure VM for monitoring industrial process controllers.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Secure cryptographic key management system (CKMS) considerations for smart grid devices.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Addressing the need for independence in the CSE model.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

2010
Quantifying security threats and their potential impacts: a case study.
Innov. Syst. Softw. Eng., 2010

Moving Toward Trustworthy Systems: R&D Essentials.
Computer, 2010

A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance - Applying Cyber Security Econometrics System (CSES) to Mission Assurance Analysis Protocol (MAAP).
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Data diodes in support of trustworthy cyber infrastructure.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

The handicap principle, strategic information warfare and the paradox of asymmetry.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Software requirements for a system to compute mean failure cost.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Modeling stakeholder/value dependency through mean failure cost.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Authentication Protocol Using Quantum Superposition States.
Int. J. Netw. Secur., 2009

Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Challenging the Mean Time to Failure: Measuring Dependability as a Mean Failure Cost.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

DOE grass roots panel.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

An outline of the three-layer survivability analysis architecture for strategic information warfare research.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Quantifying security threats and their impact.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Managing complex IT security processes with value based measures.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

2008
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

4<sup>th</sup> annual cyber security and information intelligence research workshop.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

Evaluating security controls based on key performance indicators and stakeholder mission.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

2007
Towards an Engineering Discipline of Computational Society.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

A Methodology to Evaluate Agent Oriented Software Engineering Techniques.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Measuring Reliability as a Mean Failure Cost.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

2006
Measuring the complexity of class diagrams in reverse engineering.
J. Softw. Maintenance Res. Pract., 2006

Modeling security as a dependability attribute: a refinement-based approach.
Innov. Syst. Softw. Eng., 2006

Bank Transfer over Quantum Channel with Digital Checks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Modeling Redundancy: Quantitative and Qualitative Models.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

2005
Recoverability preservation: a measure of last resort.
Innov. Syst. Softw. Eng., 2005

Position Statement: Methodology to Support Dependable Survivable Cyber-Secure Infrastructures.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Perspectives on Redundancy: Applications to Software Certification.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

On quantum authentication protocols.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Testing Software Requirements with Z and Statecharts Applied to an Embedded Control System.
Softw. Qual. J., 2004

Multi-Agent System Case Studies in Command and Control, Information Fusion and Datat Managment.
Informatica (Slovenia), 2004

Assessing the effect of failure severity, coincident failures and usage-profiles on the reliability of embedded control systems.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Managing Secure Survivable Critical Infrastructures to Avoid Vulnerabilities.
Proceedings of the 8th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2004), 2004

2003
An Ontology-Based Software Agent System Case Study.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

Assessment of High Integrity Software Components for Completeness, Consistency, Fault-Tolerance, and Reliability.
Proceedings of the Component-Based Software Quality - Methods and Techniques, 2003

Suitability of Agent-Based Systems for Command and Control in Fault-Tolerant, Safety-Critical Responsive Decision Networks.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003

2002
Metrics for maintainability of class inheritance hierarchies.
J. Softw. Maintenance Res. Pract., 2002

Case Study: B2B E-Commerce System Specification and Implementation Employing Use-Case Diagrams, Digital Signatures and XML.
Proceedings of the 4th International Symposium on Multimedia Software Engineering, 2002

Examining Coincident Failures and Usage Profiles in Reliability Analysis of an Embedded Vehicle Sub-System.
Proceedings of the 16<sup>th</sup> European Simulation Multiconference: Modelling and Simulation 2002, 2002

Case Study: Implementing a Web Based Auction System Using UML and Component-Based Programming.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2001
A Review of Some Rigorous Software Design and Analysis Tools.
Softw. Focus, 2001

A Case Study: Validation of Guidance Control Software Requirements for Completeness, Consistency and Fault Tolerance.
Proceedings of the 8th Pacific Rim International Symposium on Dependable Computing (PRDC 2001), 2001

2000
Specification, Safety and Reliability Analysis Using Stochastic Petri Net Models.
Proceedings of the 10th International Workshop on Software Specification and Design, 2000

1999
Composing, analyzing and validating software models to assess the performability of competing design candidates.
Ann. Softw. Eng., 1999

Tool-Based Approach to Distributed Database Design: Includes Web-Based Forms Design for Access to Academic Affairs Data.
Proceedings of the 1999 ACM Symposium on Applied Computing, 1999

1998
Analysis of Real-Time Concurrent System Models based on CSP Using Stochastic Petri Nets.
Proceedings of the 12<sup>th</sup> European Simulation Multiconference - Simulation, 1998

1996
Specification and Analysis of Real-Time Systems Using CSP and Petri Nets.
Int. J. Softw. Eng. Knowl. Eng., 1996

1995
Reliability analysis of CSP specifications using Petri nets and Markov processes.
Proceedings of the 28th Annual Hawaii International Conference on System Sciences (HICSS-28), 1995

1994
Specification of Stochastic Properties with CSP.
Proceedings of the Proceedings 1994 International Conference on Parallel and Distributed Systems, 1994

1993
Reliability prediction of distributed embedded fault-tolerant systems.
Proceedings of the Fourth International Symposium on Software Reliability Engineering, 1993

1992
Reliability Measurement: From Theory to Practice.
IEEE Softw., 1992

Simulation-Based Analysis for Real-Time Systems Development.
Proceedings of the Real Time Computing, 1992


  Loading...