Research methods for cyber security TW Edgar, DO Manz Syngress, 2017 | 393 | 2017 |
Exploratory study TW Edgar, DO Manz Research methods for cyber security 29, 95-130, 2017 | 163 | 2017 |
Securing wide area measurement systems MD Hadley, JB McBride, TW Edgar, LR O’Neil, JD Johnson US Department of Energy, 2007 | 54 | 2007 |
Predictive modeling for insider threat mitigation FL Greitzer, P Paulson, L Kangas, LR Franklin, TW Edgar, DA Frincke Richland, WA: Pacific Northwest National Laboratory, 6-17, 2009 | 53 | 2009 |
Chapter 6-machine learning TW Edgar, DO Manz Research methods for cyber security, 153-173, 2017 | 49 | 2017 |
Science and cyber security TW Edgar, DO Manz Research methods for cyber security, 33-62, 2017 | 40 | 2017 |
Security and privacy in cyber-physical systems GA Fink, TW Edgar, TR Rice, DG MacDonald, CE Crawford Cyber-physical systems, 129-141, 2017 | 38 | 2017 |
Evaluating transactive controls of integrated transmission and distribution systems using the framework for network co-simulation J Hansen, T Edgar, J Daily, D Wu 2017 American control conference (ACC), 4010-4017, 2017 | 27 | 2017 |
Extracting dependencies between network assets using deep learning TE Carroll, S Chikkagoudar, TW Edgar, KJ Oler, KM Arthur, DM Johnson, ... US Patent 10,833,954, 2020 | 23 | 2020 |
Towards an experimental testbed facility for cyber-physical security research T Edgar, D Manz, T Carroll Proceedings of the Seventh Annual Workshop on Cyber Security and Information …, 2011 | 22 | 2011 |
Chapter 3—Starting Your Research TW Edgar, DO Manz Research methods for cyber security, 63-92, 2017 | 19 | 2017 |
Realizing scientific methods for cyber security TE Carroll, D Manz, T Edgar, FL Greitzer Proceedings of the 2012 Workshop on Learning from Authoritative Security …, 2012 | 19 | 2012 |
AGA-12, Part 2 performance test results MD Hadley, KA Huston, TW Edgar Pacific Northwest National Laboratories, 2007 | 19 | 2007 |
Overview of security and privacy in cyber‐physical systems GA Fink, TW Edgar, TR Rice, DG MacDonald, CE Crawford Security and Privacy in Cyber‐Physical Systems: Foundations, Principles and …, 2017 | 18 | 2017 |
Descriptive study TW Edgar, DO Manz, TW Edgar, DO Manz Research Methods for Cyber Security. Elsevier, 131-151, 2017 | 15 | 2017 |
Applied Experimentation T Edgar, D Manz Research Methods for Cyber Security, 271-297, 2019 | 12 | 2019 |
Convenience sampling TW Edgar, DO Manz Research methods for cyber security, 2017 | 11 | 2017 |
Model-driven deception for control system environments W Hofer, T Edgar, D Vrabie, K Nowak 2019 IEEE International Symposium on Technologies for Homeland Security (HST …, 2019 | 9 | 2019 |
Fused sensor analysis and advanced control of industrial field devices for security: Cymbiote multi-source sensor fusion platform T Rice, G Seppala, TW Edgar, D Cain, E Choi Proceedings of the Northwest Cybersecurity Symposium, 1-8, 2019 | 8 | 2019 |
Experiment as a service TW Edgar, TR Rice 2017 IEEE International Symposium on Technologies for Homeland Security (HST …, 2017 | 8 | 2017 |