William M. S. Stout

According to our database1, William M. S. Stout authored at least 14 papers between 2012 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Get Your Head Out of the Clouds: The Illusion of Confidentiality & Privacy.
Proceedings of the 8th IEEE International Symposium on Cloud and Service Computing, 2018

Cyber Range Infrastructure Limitations and Needs of Tomorrow: A Position Paper.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

Applying a Threat Model to Cloud Computing.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

Leveraging a LiveNirtual/Constructive Testbed for the Evaluation of Moving Target Defenses.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

Toward a Multi-Agent System Architecture for Insight & Cybersecurity in Cyber-Physical Networks.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

2017
Technologies to enable cyber deception.
Proceedings of the International Carnahan Conference on Security Technology, 2017

2016
Empirical assessment of network-based Moving Target Defense approaches.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Challenges to securing the Internet of Things.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2016

MTD assessment framework with cyber attack modeling.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2016

Hypervisor Assisted Forensics and Incident Response in the Cloud.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Operational cost of deploying Moving Target Defenses defensive work factors.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Computer network deception as a Moving Target Defense.
Proceedings of the International Carnahan Conference on Security Technology, 2015

Techniques for the dynamic randomization of network attributes.
Proceedings of the International Carnahan Conference on Security Technology, 2015

2012
Network performance impact of access control policies in Tactical Wireless Networks.
Proceedings of the 31st IEEE Military Communications Conference, 2012


  Loading...