Robert K. Abercrombie

Orcid: 0000-0003-0949-4070

According to our database1, Robert K. Abercrombie authored at least 35 papers between 2007 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses.
Sensors, 2021

2019
Microgrid Disaster Resiliency Analysis: Reducing Costs in Continuity of Operations (COOP) Planning.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2017
Security management of cyber physical control systems using NIST SP 800-82r2.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Introduction to Supply Chain Security and Mutual Trust Research Minitrack.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
Towards Reducing the Data Exfiltration Surface for the Insider Threat.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Risk Assessment For Industrial Control Systems Quantifying Availability Using Mean Failure Cost (MFC).
J. Artif. Intell. Soft Comput. Res., 2015

Co-Simulation Platform for Characterizing Cyber Attacks in Cyber Physical Systems.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015

Security Analysis of Smart Grid Cyber Physical Infrastructures Using Game Theoretic Simulation.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015

A Computing Environment to Support Repeatable Scientific Big Data Experimentation of World-Wide Scientific Literature.
Proceedings of the 15th International Conference on Scientometrics and Informetrics, Istanbul, Turkey, June 29, 2015

OPNET/Simulink Based Testbed for Disturbance Detection in the Smart Grid.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

2014
Security Analysis of Selected AMI Failure Scenarios Using Agent Based Game Theoretic Simulation.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Quantifying availability in SCADA environments using the cyber security metric MFC.
Proceedings of the Cyber and Information Security Research Conference, 2014

Quantifying the impact of unavailability in cyber-physical environments.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014

2013
Conceptual framework to enable early warning of relevant phenomena "Emerging phenomena and big data".
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Risk Assessment Methodology Based on the NISTIR 7628 Guidelines.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructure.
Proceedings of the Cyber Security and Information Intelligence, 2013

Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA).
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
A study of scientometric methods to identify emerging technologies via modeling of milestones.
Scientometrics, 2012

Defining and computing a value based cyber-security measure.
Inf. Syst. E Bus. Manag., 2012

2011
Validating Cyber Security Requirements: A Case Study.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Secure VM for monitoring industrial process controllers.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Secure cryptographic key management system (CKMS) considerations for smart grid devices.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Addressing the need for independence in the CSE model.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

2010
Quantifying security threats and their potential impacts: a case study.
Innov. Syst. Softw. Eng., 2010

A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance - Applying Cyber Security Econometrics System (CSES) to Mission Assurance Analysis Protocol (MAAP).
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Software requirements for a system to compute mean failure cost.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Modeling stakeholder/value dependency through mean failure cost.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Quantifying security threats and their impact.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Managing complex IT security processes with value based measures.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

2008
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

4<sup>th</sup> annual cyber security and information intelligence research workshop.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

Evaluating security controls based on key performance indicators and stakeholder mission.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

2007
A Methodology to Evaluate Agent Oriented Software Engineering Techniques.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007


  Loading...