Rayford B. Vaughn

According to our database1, Rayford B. Vaughn authored at least 54 papers between 1993 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Introduction to the Cybersecurity Minitrack.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity Simulation.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2015
Introduction to the E-government Secure Cyberspace in 21st Century Government Minitrack.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2014
Introduction to Infrastructure Security Minitrack.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
The Power of Hands-On Exercises in SCADA Cyber Security Education.
Proceedings of the Information Assurance and Security Education and Training, 2013

Introduction to E-Government Infrastructure Security Minitrack.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Deterministic Intrusion Detection Rules for MODBUS Protocols.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Development & expansion of an industrial control system security laboratory and an international research collaboration.
Proceedings of the Cyber Security and Information Intelligence, 2013

Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security.
Proceedings of the Eleventh Australasian Information Security Conference, 2013

2012
A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control Systems.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
A testbed for SCADA control system cybersecurity research and pedagogy.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Information system security compliance to FISMA standard: a quantitative measure.
Telecommun. Syst., 2010

Structured Forensics Examination Planning with Domain Modeling: A Report of Three Experiment Trials.
J. Digit. Forensic Pract., 2010

2009
Discovering vulnerabilities in control system human-machine interface software.
J. Syst. Softw., 2009

Outreach, Teaching and Research Facilitated by a Forensics Training Center in Direct Support of Public Safety and Criminal Justice.
Int. J. Comput. Their Appl., 2009

A Discovery Learning Approach to Information Assurance Education.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2008
A Comparison of Forensic Hard Drive Imagers: A Time Analysis Comparison Between the ICS Image MASSter-Solo III and the Logicube Talon.
J. Digit. Forensic Pract., 2008

Time Analysis of Hard Drive Imaging Tools.
Proceedings of the Advances in Digital Forensics IV, 2008

2007
Leadership by example: A perspective on the influence of Barry Boehm.
J. Syst. Softw., 2007

Using Search Engines to Acquire Network Forensic Evidence.
Proceedings of the Advances in Digital Forensics III, 2007

The Development of a University-Based Forensics Training Center as a Regional Outreach and Service Activity.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Digital Forensics--State of the Science and Foundational Research Activity.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Sensor Corroboration for Anomaly Sensors in an Intrusion Detection Environment.
Proceedings of the ISCA 20th International Conference on Computer Applications in Industry and Engineering, 2007

Efficient Update on Exploitation Graphs for Vulnerability Analysis.
Proceedings of the ISCA 20th International Conference on Computer Applications in Industry and Engineering, 2007

2006
An Approach to Model Network Exploitations Using Exploitation Graphs.
Simul., 2006

Honey Tokens and Web Bugs: Developing Reactive Techniques for Investigating Phishing Scams.
J. Digit. Forensic Pract., 2006

Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

Experiences with Honeypot Systems: Development, Deployment, and Analysis.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Keeping An Educational Network Healthy: Differentiating Malicious And Naive Students On An Educational Network Environment.
Proceedings of the 2006 International Conference on Security & Management, 2006

Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

2005
Software requirement understanding using Pathfinder networks: discovering and evaluating mental models.
J. Syst. Softw., 2005

Lightweight monitoring of MPI programs in real time.
Concurr. Comput. Pract. Exp., 2005

Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005

Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models.
Proceedings of the Information Security, 8th International Conference, 2005

A Cognitive Model for Alert Correlation in a Distributed Environment.
Proceedings of the Intelligence and Security Informatics, 2005

2004
Detecting Anomalies in High-Performance Parallel Programs.
J. Digit. Inf. Manag., 2004

Decision Making For Network Health Assessment In An Intelligent Intrusion Detection System Architecture.
Int. J. Inf. Technol. Decis. Mak., 2004

Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Advances in the provisions of system and software security - Thirty years of progress.
Adv. Comput., 2003

Adaptive intrusion detection with data mining.
Proceedings of the IEEE International Conference on Systems, 2003

Panel: Teaching Undergraduate Information Assurance.
Proceedings of the Security Education and Critical Infrastructures, 2003

Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Classification of anomalous traces of privileged and parallel programs by neural networks.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003

2002
An empirical study of industrial security-engineering practices.
J. Syst. Softw., 2002

Panel 1: Changing Conditions for Undergraduate Software Engineering Programs.
Proceedings of the 15th Conference on Software Engineering Education and Training (CSEET'02), 2002

2001
Teaching Industrial Practices in an Undergraduate Software Engineering Course.
Comput. Sci. Educ., 2001

2000
Application of security tot he computing science classroom.
Proceedings of the 31st SIGCSE Technical Symposium on Computer Science Education, 2000

A Report on Industrial Transfer of Software Engineering to the Classroom Environment.
Proceedings of the Thirteenth Conference on Software Engineering Education and Training, 2000

1999
Integration of computer security into the software engineering and computer science programs.
J. Syst. Softw., 1999

Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum).
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1994
A Proposed Mechanism for Implementation of Non-Discretionary Access Controls in a Network Environment.
Comput. Networks ISDN Syst., 1994

1993
A survey of security issues in office computation and the application of secure computing models to office systems.
Comput. Secur., 1993


  Loading...