Glenn A. Fink

Orcid: 0000-0001-5731-6514

According to our database1, Glenn A. Fink authored at least 34 papers between 2001 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Helping IT and OT Defenders Collaborate.
CoRR, 2019

Building Executable Secure Design Models for Smart Contracts with Formal Methods.
Proceedings of the Financial Cryptography and Data Security, 2019

2018
Helping IT and OT Defenders Collaborate.
Proceedings of the IEEE International Conference on Industrial Internet, 2018

2016
Differentially private distributed sensing.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

2015
Behavior-dependent Routing: Responding to Anomalies with Automated Low-cost Measures.
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015

Security and privacy grand challenges for the Internet of Things.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015

2014
Defense on the Move: Ant-Based Cyber Defense.
IEEE Secur. Priv., 2014

Using Set-Based Heading to Improve Mobile Agent Movement.
Proceedings of the Eighth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2014

2013
Ants, To-Go: A Portable Demonstration of Large Infrastructure Cyber Defense.
Proceedings of the 7th IEEE International Conference on Self-Adaptation and Self-Organizing Systems Workshops, 2013

Bio-inspired cyber security for smart grid deployments.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2013

Gamification for Measuring Cyber Security Situational Awareness.
Proceedings of the Foundations of Augmented Cognition, 2013

2012
Directional Bias and Pheromone for Discovery and Coverage on Networks.
Proceedings of the Sixth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2012

Shopping for danger e-commerce techniques applied to collaboration in cyber security.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

2011
Bio-Inspired Enterprise Security.
Proceedings of the 5th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2011

Situational Awareness as a Measure of Performance in Cyber Security Collaborative Work.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

Ant-Based Cyber Security.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

Analytic provenance: process+interaction+insight.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
A multi-phase network situational awareness cognitive task analysis.
Inf. Vis., 2010

Cognitive task analysis of network analysts and managers for network situational awareness.
Proceedings of the Visualization and Data Analysis, 2010

DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

Towards efficient collaboration in cyber security.
Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010

A hybrid Authentication and authorization process for control system networks.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Visualizing cyber security: Usable workspaces.
Proceedings of the 6th International Workshop on Visualization for Cyber Security, 2009

Professional analysts using a large, high-resolution display.
Proceedings of the 4th IEEE Symposium on Visual Analytics Science and Technology, 2009

2008
Predicting Computer System Failures Using Support Vector Machines.
Proceedings of the First USENIX Workshop on the Analysis of System Logs, 2008

2007
Autonomic Computing: Freedom or Threat?
login Usenix Mag., 2007

Autonomic Computing: Our Hopes, Dreams, and Fears.
Proceedings of the 21th Large Installation System Administration Conference, 2007

Who's the Boss? Autonomics and New-Fangled Security Gizmos with Minds of Their Own.
Proceedings of the 21th Large Installation System Administration Conference, 2007

2006
Bridging the Host-Network Divide: Survey, Taxonomy, and Solution.
Proceedings of the 20th Conference on Systems Administration (LISA 2006), 2006

2005
Root Polar Layout of Internet Address Data for Security Administration.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005

Visual Correlation of Host Processes and Network Traffic.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005

2004
Home-centric visualization of network traffic for security administration.
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004

2002
A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

2001
Intrusion Detection and Response for Real-Time Distributed Naval Systems.
Scalable Comput. Pract. Exp., 2001


  Loading...