Adapting bro into scada: building a specification-based intrusion detection system for the dnp3 protocol H Lin, A Slagell, C Di Martino, Z Kalbarczyk, RK Iyer Proceedings of the Eighth Annual Cyber Security and Information Intelligence …, 2013 | 164 | 2013 |
Runtime semantic security analysis to detect and mitigate control-related attacks in power grids H Lin, A Slagell, ZT Kalbarczyk, PW Sauer, RK Iyer IEEE Transactions on Smart Grid 9 (1), 163-178, 2016 | 124 | 2016 |
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs. AJ Slagell, K Lakkaraju, K Luo LISA 6, 3-8, 2006 | 118 | 2006 |
Sharing computer network logs for security and privacy: A motivation for new methodologies of anonymization A Slagell, W Yurcik Workshop of the 1st International Conference on Security and Privacy for …, 2005 | 90 | 2005 |
Semantic security analysis of SCADA networks to detect malicious control commands in power grids H Lin, A Slagell, Z Kalbarczyk, PW Sauer, RK Iyer Proceedings of the first ACM workshop on Smart energy grid security, 29-34, 2013 | 71 | 2013 |
The design of VisFlowConnect-IP: a link analysis system for IP security situational awareness X Yin, W Yurcik, A Slagell Third IEEE International Workshop on Information Assurance (IWIA'05), 141-153, 2005 | 63 | 2005 |
A survey of PKI components and scalability issues A Slagell, R Bonilla, W Yurcik 2006 IEEE International Performance Computing and Communications Conference …, 2006 | 58 | 2006 |
Closing-the-loop in nvisionip: Integrating discovery and search in security visualizations K Lakkaraju, R Bearavolu, A Slagell, W Yurcik, S North IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 75-82, 2005 | 58 | 2005 |
A taxonomy and adversarial model for attacks against network log anonymization J King, K Lakkaraju, A Slagell Proceedings of the 2009 ACM symposium on Applied Computing, 1286-1293, 2009 | 54 | 2009 |
Preemptive intrusion detection: Theoretical framework and real-world measurements P Cao, E Badger, Z Kalbarczyk, R Iyer, A Slagell Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-12, 2015 | 53 | 2015 |
Credential Wallets: A Classification of Credential Repositories Highlighting MyProxy WJ Yurcik, RF Bonilla, A Stagell, J Basney TPRC, 2003 | 52 | 2003 |
Evaluating the utility of anonymized network traces for intrusion detection K Lakkaraju, A Slagell Proceedings of the 4th international conference on Security and privacy in …, 2008 | 46 | 2008 |
Sharing network logs for computer forensics: A new tool for the anonymization of netflow records AJ Slagell, Y Li, K Luo Workshop of the 1st International Conference on Security and Privacy for …, 2005 | 39 | 2005 |
Sels: a secure e-mail list service H Khurana, A Slagell, R Bonilla Proceedings of the 2005 ACM symposium on Applied computing, 306-313, 2005 | 39 | 2005 |
Network log anonymization: Application of crypto-pan to cisco netflows A Slagell, J Wang, W Yurcik Proceedings of the Workshop on Secure Knowledge Management 2004, 2004 | 38 | 2004 |
The bro network security monitor V Paxson, R Sommer, S Hall, C Kreibich, J Barlow, G Clark, G Maier, ... Bro. org.[Online]. Available: https://www. bro. org/.[Accessed: 10-Mar-2017], 2017 | 30 | 2017 |
Canine: A combined conversion and anonymization tool for processing netflows for security Y Li, A Slagell, K Luo, W Yurcik International conference on telecommunication systems modeling and analysis 21, 2005 | 27 | 2005 |
Known-plain text attack against a permutation based video encryption algorithm JA Slagell Security, 1-10, 2004 | 21 | 2004 |
VisFlowConnect-IP: an animated link analysis tool for visualizing netflows X Yin, W Yurcik, A Slagell FLOCON-Network Flow Analysis Workshop (Network Flow Analysis for Security …, 2005 | 17 | 2005 |
SCRUB-PA: A multi-level multi-dimensional anonymization tool for process accounting K Luo, Y Li, C Ermopoulos, W Yurcik, A Slagell arXiv preprint cs/0601079, 2006 | 16 | 2006 |