Jason M. Pittman

Orcid: 0000-0002-5198-8157

According to our database1, Jason M. Pittman authored at least 19 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
To What Extent Are Honeypots and Honeynets Autonomic Computing Systems?
CoRR, 2023

A Comparative Analysis of Port Scanning Tool Efficacy.
CoRR, 2023

Reproducing Random Forest Efficacy in Detecting Port Scanning.
CoRR, 2023

Machine Learning and Port Scans: A Systematic Review.
CoRR, 2023

2021
How Early is Early Enough: Correlating Student Performance with Final Grades.
Proceedings of the CEP '21: Computing Education Practice 2021, 2021

DRAT - A Dynamic Resource Allocation Tool for Estimating Compute Power in a Cybersecurity Engineering Learning Facility.
Proceedings of the CEP '21: Computing Education Practice 2021, 2021

2020
Detecting Synthetic Phenomenology in a Contained Artificial General Intelligence.
CoRR, 2020

Primer - A Tool for Testing Honeypot Measures of Effectiveness.
CoRR, 2020

A Taxonomy for Dynamic Honeypot Measures of Effectiveness.
CoRR, 2020

Shades of Perception- User Factors in Identifying Password Strength.
CoRR, 2020

Exploring the CELF - An Innovative Cyber Engineering Learning Facility.
Proceedings of the IEEE Frontiers in Education Conference, 2020

2019
B2CI 2019: The IEEE Brain to Computer Interface Competition's Gaming Event.
Proceedings of the IEEE Conference on Games, 2019

2018
Stovepiping and Malicious Software: A Critical Review of AGI Containment.
CoRR, 2018

A Cyber Science Based Ontology for Artificial General Intelligence Containment.
CoRR, 2018

Curating Research Data - Cyber security perspective from a nascent Brain Machine Interface Laboratory.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

2016
An Enhanced Visualization Tool for Teaching Monoalphabetic Substitution Cipher Frequency Analysis.
Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research, 2016

2015
A Survey of Botnet Detection Techniques by Command and Control Infrastructure.
J. Digit. Forensics Secur. Law, 2015

Does Competitor Grade Level Influence Perception of Cybersecurity Competition Design Gender Inclusiveness?
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, 2015

The Cybersecurity Competition Federation.
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, 2015


  Loading...