Roger Hallman

Orcid: 0000-0002-0971-2077

According to our database1, Roger Hallman authored at least 26 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Generative Deep Learning for Solutions to Data Deconflation Problems in Information and Operational Technology Networks.
Proceedings of the 8th International Conference on Internet of Things, 2023

2022
Poster EveGAN: Using Generative Deep Learning for Cryptanalysis.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Determining a Return on Investment for Cybersecurity Technologies in Networked Critical Infrastructures.
Int. J. Organ. Collect. Intell., 2021

The Data Deconflation Problem: Moving from Classical to Emerging Solutions.
Proceedings of the 6th International Conference on Internet of Things, 2021

2020
Decepti-SCADA: A cyber deception framework for active defense of networked critical infrastructures.
Internet Things, 2020

Decepti-SCADA: A Framework for Actively Defending Networked Critical Infrastructures.
Proceedings of the 5th International Conference on Internet of Things, 2020

Return on Cybersecurity Investment in Operational Technology Systems: Quantifying the Value That Cybersecurity Technologies Provide after Integration.
Proceedings of the 5th International Conference on Complexity, 2020

Predicting Criticality in COVID-19 Patients.
Proceedings of the BCB '20: 11th ACM International Conference on Bioinformatics, 2020

2018
Homomorphic Encryption for Secure Computation on Big Data.
Proceedings of the 3rd International Conference on Internet of Things, 2018

Aggregated Machine Learning on Indicators of Compromise in Android Devices.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Building Applications with Homomorphic Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2nd International Workshop on Multimedia Privacy and Security.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Session details: GDPR.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

Session details: Communication and Data Privacy and Integrity.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

Session details: Steganography, Steganalysis, and Watermarking.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

Session details: Internet of Things and Cloud-based Services.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

Session details: Keynote Address.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

2017
AutoMigrate: a framework for developing intelligent, self-managing cloud services with maximum availability.
Clust. Comput., 2017

IoDDoS - The Internet of Distributed Denial of Sevice Attacks - A Case Study of the Mirai Malware and IoT-Based Botnets.
Proceedings of the 2nd International Conference on Internet of Things, 2017

Workshop on Multimedia Privacy and Security.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

An Approach to Botnet Malware Detection Using Nonparametric Bayesian Methods.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Security in the Industrial Internet of Things - The C-SEC Approach.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

AutoMigrate: A Framework for Developing Intelligent, Self-Managing Cloud Services with Maximum Availability.
Proceedings of the 2016 International Conference on Cloud and Autonomic Computing, 2016

CallForFire: A Mission-Critical Cloud-Based Application Built Using the Nomad Framework.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
An Approach to Organizational Cybersecurity.
Proceedings of the Enterprise Security - Second International Workshop, 2015

Nomad: A Framework for Developing Mission-Critical Cloud-Based Applications.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015


  Loading...