Michael D. Iannacone

Orcid: 0000-0003-3081-4761

According to our database1, Michael D. Iannacone authored at least 21 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Developing and Deploying Security Applications for In-Vehicle Networks.
CoRR, 2023

AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Detecting CAN Masquerade Attacks with Signal Clustering Similarity.
CoRR, 2022

Stealthy Cyber Anomaly Detection On Large Noisy Multi-material 3D Printer Datasets Using Probabilistic Models.
Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D Printing) Security, 2022

2021
CAN-D: A Modular Four-Step Pipeline for Comprehensively Decoding Controller Area Network Data.
IEEE Trans. Veh. Technol., 2021

Time-Based CAN Intrusion Detection Benchmark.
CoRR, 2021

2020
A Survey of Intrusion Detection Systems Leveraging Host Data.
ACM Comput. Surv., 2020

ROAD: The Real ORNL Automotive Dynamometer Controller Area Network Intrusion Detection Dataset (with a comprehensive CAN IDS dataset survey & guide).
CoRR, 2020

Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection.
CoRR, 2020

Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach.
Comput. Secur., 2020

2019
A Holistic Approach to Evaluating Cyber Security Defensive Capabilities.
CoRR, 2019

2018
How do information security workers use host data? A summary of interviews with security analysts.
CoRR, 2018

2017
Cybersecurity Automated Information Extraction Techniques: Drawbacks of Current Methods, and Enhanced Extractors.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

2016
GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2015
Developing an Ontology for Cyber Security Knowledge Graphs.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

2014
Integration of external data sources with cyber security data warehouse.
Proceedings of the Cyber and Information Security Research Conference, 2014

2013
Automatic Labeling for Entity Extraction in Cyber Security.
CoRR, 2013

PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-security Concepts.
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013

2012
NV: Nessus vulnerability visualization for the web.
Proceedings of the 9th International Symposium on Visualization for Cyber Security, 2012

situ: Situational understanding and discovery for cyber attacks.
Proceedings of the 7th IEEE Conference on Visual Analytics Science and Technology, 2012

2009
A Low-Latency TDMA Scheduler for Multi-hop Cluster Based MANETs with Directional Antennas.
Proceedings of the Ad Hoc Networks, First International Conference, 2009


  Loading...