Travis Atkison

Orcid: 0000-0001-7258-7355

According to our database1, Travis Atkison authored at least 39 papers between 2000 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Secure Future for Open-Source Computational Science and Engineering.
Comput. Sci. Eng., 2022

Reinforcement Learning based Cyberattack Model for Adaptive Traffic Signal Controller in Connected Transportation Systems.
CoRR, 2022

2021
VANET applications: Past, present, and future.
Veh. Commun., 2021

An Innovative Attack Modelling and Attack Detection Approach for a Waiting Time-based Adaptive Traffic Signal Controller.
CoRR, 2021

2020
Characterizing co-modality in urban transit systems from a passengers' perspective.
Public Transp., 2020

Classification on grade, price, and region with multi-label and multi-target methods in wineinformatics.
Big Data Min. Anal., 2020

2019
Investigating Personally Identifiable Information Posted on Twitter Before and After Disasters.
Proceedings of the Services - SERVICES 2019, 2019

802.11ac and p in a Simulated VANET Environment.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Towards Detection of Abnormal Vehicle Behavior Using Traffic Cameras.
Proceedings of the Big Data - BigData 2019, 2019

2018
A Forensic Enabled Data Provenance Model for Public Cloud.
J. Digit. Forensics Secur. Law, 2018

Feature Extraction Optimization for Network Intrusion Detection in Control System Networks.
Int. J. Netw. Secur., 2018

Testing vulnerabilities in bluetooth low energy.
Proceedings of the ACMSE 2018 Conference, Richmond, KY, USA, March 29-31, 2018, 2018

Preliminary research on thesaurus-based query expansion for Twitter data extraction.
Proceedings of the ACMSE 2018 Conference, Richmond, KY, USA, March 29-31, 2018, 2018

Causes, impacts, and detection approaches of code smell: a survey.
Proceedings of the ACMSE 2018 Conference, Richmond, KY, USA, March 29-31, 2018, 2018

2017
A Wineinformatics Study for White-box Classification Algorithms to Understand and Evaluate Wine Judges.
Trans. Mach. Learn. Data Min., 2017

A Power Grid Incident Identification Based on Physically Derived Cyber-Event Detection.
J. Digit. Forensics Secur. Law, 2017

On the detection of cyber-events in the grid using PCA.
Int. J. Crit. Infrastructures, 2017

Granular computing in wineinformatics.
Proceedings of the 13th International Conference on Natural Computation, 2017

An Experimental Analysis of Windows Log Events Triggered by Malware.
Proceedings of the 2017 ACM Southeast Regional Conference, 2017

Evaluation of Firefox Browser Forensics Tools.
Proceedings of the 2017 ACM Southeast Regional Conference, 2017

A Comparison of Features for Android Malware Detection.
Proceedings of the 2017 ACM Southeast Regional Conference, 2017

A Comparison of Fuzzy Hashes: Evaluation, Guidelines, and Future Suggestions.
Proceedings of the 2017 ACM Southeast Regional Conference, 2017

2016
Industrial Control System Network Intrusion Detection by Telemetry Analysis.
IEEE Trans. Dependable Secur. Comput., 2016

2014
A dimensional transformation scheme for power grid cyber event detection.
Proceedings of the Cyber and Information Security Research Conference, 2014

Detection of SSH host spoofing in control systems through network telemetry analysis.
Proceedings of the Cyber and Information Security Research Conference, 2014

2013
Evaluation of Random Projection for Malware Classification.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Observing industrial control system attacks launched via metasploit framework.
Proceedings of the ACM Southeast Regional Conference 2013, 2013

Applying static analysis to high-dimensional malicious application detection.
Proceedings of the ACM Southeast Regional Conference 2013, 2013

Evolution of digital forensics in virtualization by using virtual machine introspection.
Proceedings of the ACM Southeast Regional Conference 2013, 2013

2012
Combining lexical and structural information for static bug localisation.
Int. J. Comput. Appl. Technol., 2012

Applying random projection to the classification of malicious applications using data mining algorithms.
Proceedings of the 50th Annual Southeast Regional Conference, 2012

Evolution of traditional digital forensics in virtualization.
Proceedings of the 50th Annual Southeast Regional Conference, 2012

2011
Using Executable Slicing to Improve Rogue Software Detection Algorithms.
Int. J. Secur. Softw. Eng., 2011

Using randomized projection techniques to aid in detecting high-dimensional malicious applications.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

Digital forensics on a virtual machine.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

2010
Aiding prediction algorithms in detecting high-dimensional malicious applications using a randomized projection technique.
Proceedings of the 48th Annual Southeast Regional Conference, 2010

2009
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications.
Proceedings of the 47th Annual Southeast Regional Conference, 2009

2001
Case Study: Visualization and Information Retrieval Techniques for Network Intrusion Detection.
Proceedings of the 3rd Joint Eurographics - IEEE TCVG Symposium on Visualization, 2001

2000
Comparing CPU Performance Between and Within Processor Families.
Proceedings of the 26th International Computer Measurement Group Conference, 2000


  Loading...