Miles McQueen

According to our database1, Miles McQueen authored at least 16 papers between 2002 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Optimal placement of Phasor Measurement Units in power grids using Memetic Algorithms.
Proceedings of the 23rd IEEE International Symposium on Industrial Electronics, 2014

Vulnerability identification and classification via text mining bug databases.
Proceedings of the IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society, Dallas, TX, USA, October 29, 2014

2013
Smart Grid Data Integrity Attacks.
IEEE Trans. Smart Grid, 2013

Analyses of two end-user software vulnerability exposure metrics (extended version).
Inf. Secur. Tech. Rep., 2013

Multi-criteria based staging of Optimal PMU Placement using Fuzzy Weighted Average.
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013

Information gain based dimensionality selection for classifying text documents.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013

Estimating Software Vulnerabilities: A Case Study Based on the Misclassification of Bugs in MySQL Server.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Mining Bug Databases for Unidentified Software Vulnerabilities.
Proceedings of the 2012 5th International Conference on Human System Interactions, 2012

Improving Control System Cyber-State Awareness Using Known Secure Sensor Measurements.
Proceedings of the Critical Information Infrastructures Security, 2012

Analyses of Two End-User Software Vulnerability Exposure Metrics.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Smart grid data integrity attacks: characterizations and countermeasures<sup>π</sup>.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011

'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State.
Proceedings of the Software Engineering for Resilient Systems, 2011

Are Vulnerability Disclosure Deadlines Justified?
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011

2006
Measuring the attack surfaces of two FTP daemons.
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006

2004
Scheduling Issues In Survivability Applications Using Hybrid Fault Models.
Parallel Process. Lett., 2004

2002
On the Performance of a Survivability Architecture for Networked Computing Systems.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002


  Loading...