Mark W. Patton

According to our database1, Mark W. Patton authored at least 21 papers between 2011 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

2019
Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) Tool.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Performance Modeling of Hyperledger Sawtooth Blockchain.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

2018
Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach.
IEEE Intell. Syst., 2018

Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

2017
Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Large scale port scanning through tor using parallel Nmap scans to scan large portions of the IPv4 range.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Assessing medical device vulnerabilities on the Internet of Things.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

2016
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Anonymous port scanning: Performing network reconnaissance through Tor.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Identifying devices across the IPv4 address space.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

SCADA honeypots: An in-depth analysis of Conpot.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Identifying top listers in Alphabay using Latent Dirichlet Allocation.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Shodan visualized.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

2014
Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT).
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

2011
Embodied Conversational Agent - Based Kiosk for Automated Interviewing.
J. Manag. Inf. Syst., 2011


  Loading...