Robert A. Bridges

Orcid: 0000-0001-7962-6329

According to our database1, Robert A. Bridges authored at least 46 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Testing SOAR tools in use.
Comput. Secur., June, 2023

ExpM+NF: Differentially Private Machine Learning that Surpasses DPSGD.
CoRR, 2023

AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Assembling a Cyber Range to Evaluate Artificial Intelligence / Machine Learning (AI/ML) Security Tools.
CoRR, 2022

Detecting CAN Masquerade Attacks with Signal Clustering Similarity.
CoRR, 2022

2021
CAN-D: A Modular Four-Step Pipeline for Comprehensively Decoding Controller Area Network Data.
IEEE Trans. Veh. Technol., 2021

What Clinical Trials Can Teach Us about the Development of More Resilient AI for Cybersecurity.
CoRR, 2021

Time-Based CAN Intrusion Detection Benchmark.
CoRR, 2021

D2U: Data Driven User Emulation for the Enhancement of Cyber Testing, Training, and Data Set Generation.
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021

A Mathematical Framework for Evaluation of SOAR Tools with Limited Survey Data.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

2020
A Survey of Intrusion Detection Systems Leveraging Host Data.
ACM Comput. Surv., 2020

ROAD: The Real ORNL Automotive Dynamometer Controller Area Network Intrusion Detection Dataset (with a comprehensive CAN IDS dataset survey & guide).
CoRR, 2020

Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection.
CoRR, 2020

Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach.
Comput. Secur., 2020

An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

2019
Situ: Identifying and Explaining Suspicious Behavior in Networks.
IEEE Trans. Vis. Comput. Graph., 2019

A Holistic Approach to Evaluating Cyber Security Defensive Capabilities.
CoRR, 2019

Data-Driven Extraction of Vehicle States From CAN Bus Traffic for Cyberprotection and Safety.
IEEE Consumer Electron. Mag., 2019

Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection.
Proceedings of the Science of Cyber Security - Second International Conference, 2019

Active Manifolds: A non-linear analogue to Active Subspaces.
Proceedings of the 36th International Conference on Machine Learning, 2019

Towards a CAN IDS Based on a Neural Network Data Field Predictor.
Proceedings of the ACM Workshop on Automotive Cybersecurity, 2019

2018
How do information security workers use host data? A summary of interviews with security analysts.
CoRR, 2018

ACTT: Automotive CAN Tokenization and Translation.
CoRR, 2018

Forming IDEAS Interactive Data Exploration & Analysis System.
CoRR, 2018

Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics (Extended Version).
CoRR, 2018

Dimension Reduction Using Active Manifolds.
CoRR, 2018

Exploiting the Shape of CAN Data for In-Vehicle Intrusion Detection.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Defining a Metric Space of Host Logs and Operational Use Cases.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

EGBTER: Capturing Degree Distribution, Clustering Coefficients, and Community Structure in a Single Random Graph Model.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
Malware Detection on General-Purpose Computers Using Power Consumption Monitoring: A Proof of Concept and Case Study.
CoRR, 2017

Automated Behavioral Analysis of Malware: A Case Study of WannaCry Ransomware.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

Cybersecurity Automated Information Extraction Techniques: Drawbacks of Current Methods, and Enhanced Extractors.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

Setting the threshold for high throughput detectors: A mathematical approach for ensembles of dynamic, heterogeneous, probabilistic anomaly detectors.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
A multi-level anomaly detection algorithm for time-varying graph data with interactive visualization.
Soc. Netw. Anal. Min., 2016

Understanding GPU Power: A Survey of Profiling, Modeling, and Simulation Methods.
ACM Comput. Surv., 2016

GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2015
Towards a Relation Extraction Framework for Cyber-Security Concepts.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

Developing an Ontology for Cyber Security Knowledge Graphs.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

Multi-Level Anomaly Detection on Time-Varying Graph Data.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Multi-Level Anomaly Detection on Streaming Graph Data.
CoRR, 2014

Integration of external data sources with cyber security data warehouse.
Proceedings of the Cyber and Information Security Research Conference, 2014

2013
Automatic Labeling for Entity Extraction in Cyber Security.
CoRR, 2013

PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-security Concepts.
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013

2012
A New, Principled Approach to Anomaly Detection.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012


  Loading...