Jeffrey L. Hieb

According to our database1, Jeffrey L. Hieb authored at least 20 papers between 1990 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Exploratory Learning in Engineering Programming.
Proceedings of the IEEE Frontiers in Education Conference, 2023

2019
Modeling and Machine-Checking Bump-in-the-Wire Security for Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection XIII, 2019

Barriers and bottlenecks in engineering mathematics: Math completion predicts persistence to graduation.
Proceedings of the IEEE Frontiers in Education Conference, 2019

2017
Investigating psychological safety in a flipped engineering course.
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017

Retrieval practice and spacing in an engineering mathematics classroom: Do the effects add up?
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017

2016
Improving cybersecurity for Industrial Control Systems.
Proceedings of the 25th IEEE International Symposium on Industrial Electronics, 2016

2013
A security-hardened appliance for implementing authentication and access control in SCADA infrastructures with legacy field devices.
Int. J. Crit. Infrastructure Prot., 2013

2012
Using Bloom Filters to Ensure Access Control and Authentication Requirements for SCADA Field Devices.
Proceedings of the Critical Infrastructure Protection VI, 2012

2011
A digraph model for risk identification and mangement in SCADA systems.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Active Learning Mashups for Tablet Classrooms.
Proceedings of the ISCA 26th International Conference on Computers and Their Applications, 2011

2010
Secure Internet-Based SCADA for Monitoring and Control of Industrial Processes.
Int. J. Comput. Their Appl., 2010

2009
An Ontology for Identifying Cyber Intrusion Induced Faults in Process Control Systems.
Proceedings of the Critical Infrastructure Protection III, 2009

2008
Designing Security-Hardened Microkernels For Field Devices.
Proceedings of the Critical Infrastructure Protection II, 2008

2007
Security Enhancements for Distributed Control Systems.
Proceedings of the Critical Infrastructure Protection, 2007

Improvements in SCADA and DCS Systems Security.
Proceedings of the 22nd International Conference on Computers and Their Applications, 2007

Testing Security Enhanced SCADA Communication Protocols.
Proceedings of the ISCA 20th International Conference on Computer Applications in Industry and Engineering, 2007

2006
Dynamic Authentication Using Keystroke Biometrics.
Proceedings of the 21st International Conference on Computers and Their Applications, 2006

Security-enhanced remote terminal units for SCADA networks.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006

2005
Anomaly-Based Intrusion Monitoring Using a Dynamic Honeypot.
Proceedings of the 20th International Conference on Computers and Their Applications, 2005

1990
Improving the Smalltalk Browser: a case study in Smalltalk development.
Proceedings of the 28th Annual Southeast Regional Conference, 1990


  Loading...