A comparison of different intrusion detection approaches in an advanced metering infrastructure network using ADVISE M Rausch, B Feddersen, K Keefe, WH Sanders Quantitative Evaluation of Systems: 13th International Conference, QEST 2016 …, 2016 | 8 | 2016 |
Demonstrating a simple device fingerprinting system M Rausch, A Bakke, S Patt, B Wegner, D Scott Proceedings, Midewest Instruction and Computing Symposium, 2014 | 8 | 2014 |
An ontology framework for generating discrete-event stochastic models K Keefe, B Feddersen, M Rausch, R Wright, WH Sanders Computer Performance Engineering: 15th European Workshop, EPEW 2018, Paris …, 2018 | 7 | 2018 |
Modeling humans: A general agent model for the evaluation of security M Rausch, A Fawaz, K Keefe, WH Sanders Quantitative Evaluation of Systems: 15th International Conference, QEST 2018 …, 2018 | 6 | 2018 |
Sensitivity analysis and uncertainty quantification of state-based discrete-event simulation models through a stacked ensemble of metamodels M Rausch, WH Sanders Quantitative Evaluation of Systems: 17th International Conference, QEST 2020 …, 2020 | 5 | 2020 |
Peer-to-peer detection of DoS attacks on city-scale IoT mesh networks MJ Rausch, VB Krishna, P Gu, R Chandra, B Feddersen, A Fawaz, ... 2018 IEEE International Conference on Communications, Control, and Computing …, 2018 | 5 | 2018 |
Automatically generating security models from system models to aid in the evaluation of AMI deployment options M Rausch, K Keefe, B Feddersen, WH Sanders Critical Information Infrastructures Security: 12th International Conference …, 2018 | 5 | 2018 |
Stacked metamodels for sensitivity analysis and uncertainty quantification of AMI models M Rausch, WH Sanders 2020 IEEE International Conference on Communications, Control, and Computing …, 2020 | 4 | 2020 |
Remax: Reachability-maximizing p2p detection of erroneous readings in wireless sensor networks VB Krishna, M Rausch, BE Ujcich, I Gupta, WH Sanders 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 4 | 2017 |
Determining cost-effective intrusion detection approaches for an advanced metering infrastructure deployment using ADVISE MJ Rausch University of Illinois at Urbana-Champaign, 2016 | 4 | 2016 |
Searching for indicators of device fingerprinting in the javascript code of popular websites M Rausch, N Good, CJ Hoofnagle Proceedings, Midewest Instruction and Computing Symposium, 2014 | 3 | 2014 |
Evaluating the effectiveness of metamodeling in emulating quantitative models M Rausch, WH Sanders Quantitative Evaluation of Systems: 18th International Conference, QEST 2021 …, 2021 | 2 | 2021 |
Addressing challenges to quantitative security modeling MJ Rausch University of Illinois at Urbana-Champaign, 2021 | | 2021 |
IRMA via SDN: Intrusion Response and Monitoring Appliance via Software-Defined Networking BE Ujcich, MJ Rausch, K Nahrstedt, WH Sanders | | 2015 |
Responding to Malicious Traffic with an Intrusion Detection System in a Software-Defined Network BE Ujcich, M Rausch | | |