Stacy J. Prowell

Orcid: 0000-0002-2104-5641

According to our database1, Stacy J. Prowell authored at least 27 papers between 1998 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Shifting Left for Machine Learning: An Empirical Study of Security Weaknesses in Supervised Learning-based Projects.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
A Taxonomy and Review of Remote Attestation Schemes in Embedded Systems.
IEEE Access, 2021

2019
Use of Thermistor Temperature Sensors for Cyber-Physical System Security.
Sensors, 2019

Emerging Paradigms in Vehicular Cybersecurity.
IEEE Consumer Electron. Mag., 2019

2018
Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics (Extended Version).
CoRR, 2018

Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems.
Proceedings of the 4th Annual Industrial Control System Security Workshop, 2018

2017
Malware Detection on General-Purpose Computers Using Power Consumption Monitoring: A Proof of Concept and Case Study.
CoRR, 2017

Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

2015
Phase-Space Detection of Cyber Events.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

2013
Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration.
Proceedings of the Cyber Security and Information Intelligence, 2013

Developing a power measurement framework for cyber defense.
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
Automated vulnerability detection for compiled smart grid software.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

Automated Behavior Computation for Software Analysis and Validation.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Behavior computation for smart grid software analysis.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
An axiom system for sequence-based specification.
Theor. Comput. Sci., 2010

2009
The impact of requirements changes on specifications and state machines.
Softw. Pract. Exp., 2009

Computing the behavior of malicious code with function extraction technology.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

2007
A Semantic Recognizer Infrastructure for Computing Loop Behavior.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2005
Position Statement: Methodology to Support Dependable Survivable Cyber-Secure Infrastructures.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Using Markov Chain Usage Models to Test Complex Systems.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

2004
Computing system reliability using Markov chain usage models.
J. Syst. Softw., 2004

A Cost-Benefit Stopping Criterion for Statistical Testing.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Foundations of Sequence-Based Software Specification.
IEEE Trans. Software Eng., 2003

JUMBL: A Tool for Model-Based Statistical Testing.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

2000
TML: a description language for Markov chain usage models.
Inf. Softw. Technol., 2000

1998
Sequence-Based Software Specification of Deterministic Systems.
Softw. Pract. Exp., 1998


  Loading...