Logan O. Mailloux

Orcid: 0000-0002-7034-8083

According to our database1, Logan O. Mailloux authored at least 25 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Concrete Safety for ML Problems: System Safety for ML Development and Assessment.
CoRR, 2023

Considerations for Cyber-Physical Design Teams Tasked with Engineering Safe and Secure Systems for a Notional Electrified Aircraft Concept.
Proceedings of the IEEE International Systems Conference, 2023

2022
System Safety Engineering for Social and Ethical ML Risks: A Case Study.
CoRR, 2022

2020
Autonomous Space Resupply Vehicle Systems Security Design Principle Case Study.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

A Security Reference Model for Autonomous Vehicles in Military Operations.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Looking Under the Hood of Z-Wave: Volatile Memory Introspection for the ZW0301 Transceiver.
ACM Trans. Cyber Phys. Syst., 2019

Analysis of Systems Security Engineering Design Principles for the Development of Secure and Resilient Systems.
IEEE Access, 2019

A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System.
Proceedings of the 2019 IEEE International Systems Conference, 2019

2018
Advancing Cybersecurity: The Growing Need for a Cyber-Resiliency Workforce.
IT Prof., 2018

Conceptual Systems Security Requirements Analysis: Aerial Refueling Case Study.
IEEE Access, 2018

Examination of security design principles from NIST SP 800-160.
Proceedings of the 2018 Annual IEEE International Systems Conference, 2018

A Systems Security Approach for Requirements Analysis of Complex Cyber-Physical Systems.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

2017
The Z-Wave routing protocol and its security implications.
Comput. Secur., 2017

A Customizable Framework for Prioritizing Systems Security Engineering Processes, Activities, and Tasks.
IEEE Access, 2017

System-Agnostic Security Domains for Understanding and Prioritizing Systems Security Engineering Efforts.
IEEE Access, 2017

System-level considerations for modeling space-based quantum key distribution architectures.
Proceedings of the 2017 Annual IEEE International Systems Conference, 2017

Considerations for secure and resilient satellite architectures.
Proceedings of the 2017 International Conference on Cyber Conflict, 2017

2016
Post-Quantum Cryptography: What Advancements in Quantum Computing Mean for IT Professionals.
IT Prof., 2016

Putting the "Systems" in Security Engineering: An Examination of NIST Special Publication 800-160.
IEEE Secur. Priv., 2016

Extraction and analysis of non-volatile memory of the ZW0301 module, a Z-Wave transceiver.
Digit. Investig., 2016

Using Modeling and Simulation to Study Photon Number Splitting Attacks.
IEEE Access, 2016

2015
Performance Evaluations of Quantum Key Distribution System Architectures.
IEEE Secur. Priv., 2015

Modeling Quantum Optical Components, Pulses and Fiber Channels Using OMNeT++.
CoRR, 2015

Quantum key distribution: examination of the decoy state protocol.
IEEE Commun. Mag., 2015

A Modeling Framework for Studying Quantum Key Distribution System Implementation Nonidealities.
IEEE Access, 2015


  Loading...