关注
Thomas Edgar
标题
引用次数
引用次数
年份
Research methods for cyber security
TW Edgar, DO Manz
Syngress, 2017
3932017
Exploratory study
TW Edgar, DO Manz
Research methods for cyber security 29, 95-130, 2017
1632017
Securing wide area measurement systems
MD Hadley, JB McBride, TW Edgar, LR O’Neil, JD Johnson
US Department of Energy, 2007
542007
Predictive modeling for insider threat mitigation
FL Greitzer, P Paulson, L Kangas, LR Franklin, TW Edgar, DA Frincke
Richland, WA: Pacific Northwest National Laboratory, 6-17, 2009
532009
Chapter 6-machine learning
TW Edgar, DO Manz
Research methods for cyber security, 153-173, 2017
492017
Science and cyber security
TW Edgar, DO Manz
Research methods for cyber security, 33-62, 2017
402017
Security and privacy in cyber-physical systems
GA Fink, TW Edgar, TR Rice, DG MacDonald, CE Crawford
Cyber-physical systems, 129-141, 2017
382017
Evaluating transactive controls of integrated transmission and distribution systems using the framework for network co-simulation
J Hansen, T Edgar, J Daily, D Wu
2017 American control conference (ACC), 4010-4017, 2017
272017
Extracting dependencies between network assets using deep learning
TE Carroll, S Chikkagoudar, TW Edgar, KJ Oler, KM Arthur, DM Johnson, ...
US Patent 10,833,954, 2020
232020
Towards an experimental testbed facility for cyber-physical security research
T Edgar, D Manz, T Carroll
Proceedings of the Seventh Annual Workshop on Cyber Security and Information …, 2011
222011
Chapter 3—Starting Your Research
TW Edgar, DO Manz
Research methods for cyber security, 63-92, 2017
192017
Realizing scientific methods for cyber security
TE Carroll, D Manz, T Edgar, FL Greitzer
Proceedings of the 2012 Workshop on Learning from Authoritative Security …, 2012
192012
AGA-12, Part 2 performance test results
MD Hadley, KA Huston, TW Edgar
Pacific Northwest National Laboratories, 2007
192007
Overview of security and privacy in cyber‐physical systems
GA Fink, TW Edgar, TR Rice, DG MacDonald, CE Crawford
Security and Privacy in Cyber‐Physical Systems: Foundations, Principles and …, 2017
182017
Descriptive study
TW Edgar, DO Manz, TW Edgar, DO Manz
Research Methods for Cyber Security. Elsevier, 131-151, 2017
152017
Applied Experimentation
T Edgar, D Manz
Research Methods for Cyber Security, 271-297, 2019
122019
Convenience sampling
TW Edgar, DO Manz
Research methods for cyber security, 2017
112017
Model-driven deception for control system environments
W Hofer, T Edgar, D Vrabie, K Nowak
2019 IEEE International Symposium on Technologies for Homeland Security (HST …, 2019
92019
Fused sensor analysis and advanced control of industrial field devices for security: Cymbiote multi-source sensor fusion platform
T Rice, G Seppala, TW Edgar, D Cain, E Choi
Proceedings of the Northwest Cybersecurity Symposium, 1-8, 2019
82019
Experiment as a service
TW Edgar, TR Rice
2017 IEEE International Symposium on Technologies for Homeland Security (HST …, 2017
82017
系统目前无法执行此操作,请稍后再试。
文章 1–20