On the credibility of manet simulations TR Andel, A Yasinsac Computer 39 (7), 48-54, 2006 | 317 | 2006 |
Computer forensics education A Yasinsac, RF Erbacher, DG Marks, MM Pollitt, PM Sommer IEEE Security & Privacy, 15-23, 2003 | 195 | 2003 |
Policies to enhance computer and network forensics A Yasinsac, Y Manzano Proceedings of the 2001 IEEE workshop on information assurance and security …, 2001 | 159 | 2001 |
Using 3d printers as weapons M Yampolskiy, A Skjellum, M Kretzschmar, RA Overfelt, KR Sloan, ... International Journal of Critical Infrastructure Protection 14, 58-71, 2016 | 122 | 2016 |
Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing M Yampolskiy, TR Andel, JT McDonald, WB Glisson, A Yasinsac Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 1-9, 2014 | 100 | 2014 |
Surveying security analysis techniques in MANET routing protocols. TR Andel, A Yasinsac IEEE Communications Surveys and Tutorials 9 (1-4), 70-84, 2007 | 82 | 2007 |
Security challenges of additive manufacturing with metals and alloys M Yampolskiy, L Schutzle, U Vaidya, A Yasinsac Critical Infrastructure Protection IX: 9th IFIP 11.10 International …, 2015 | 65 | 2015 |
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks M Burmester, TV Le, A Yasinsac Ad Hoc Networks 5 (3), 313-323, 2007 | 62 | 2007 |
An application of visual cryptography to financial documents LW Hawkes, A Yasinsac, C Cline Florida State University, Florida, 1-7, 2000 | 53 | 2000 |
Identifying flaws in the secure routing protocol J Marshall, V Thakur, A Yasinsac Performance, Computing, and Communications Conference, 2003. Conference …, 2003 | 51 | 2003 |
Honeytraps, a network forensic tool A Yasinsac, Y Manzano Sixth Multi-Conference on Systemics, Cybernetics and Informatics, 2002 | 43 | 2002 |
Honeytraps, a network forensic tool A Yasinsac, Y Manzano Sixth Multi-Conference on Systemics, Cybernetics and Informatics, 2002 | 43 | 2002 |
Software review and security analysis of the ES&S iVotronic 8.0. 1.2 voting machine firmware A Yasinsac, D Wagner, M Bishop, T Baker, B de Medeiros, G Tyson, ... Florida Department of State 66, 2007 | 38 | 2007 |
Metadata for anomaly-based security protocol attack deduction T Leckie, A Yasinsac IEEE Transactions on Knowledge and Data Engineering 16 (9), 1157-1168, 2004 | 38 | 2004 |
Ad hoc network security: Peer identification and authentication using signal properties T Suen, A Yasinsac Information Assurance Workshop, 2005. IAW'05. Proceedings from the Sixth …, 2005 | 34 | 2005 |
A family of protocols for group key generation in ad hoc networks A Yasinsac, V Thakur, S Carter, I Cubukcu Proc. of IASTED International Conference on Communications and Computer …, 2002 | 34 | 2002 |
Adaptive threat modeling for secure ad hoc routing protocols TR Andel, A Yasinsac Electronic Notes in Theoretical Computer Science 197 (2), 3-14, 2008 | 33 | 2008 |
Accountable privacy M Burmester, Y Desmedt, RN Wright, A Yasinsac Lecture Notes in Computer Science 3957, 83-95, 2006 | 32 | 2006 |
The dynamics of counting and recounting votes A Yasinsac, M Bishop IEEE Security & Privacy 6 (3), 22-29, 2008 | 29 | 2008 |
A risk assessment model for voting systems using threat trees and monte carlo simulation H Pardue, J Landry, A Yasinsac 2009 First International Workshop on Requirements Engineering for e-Voting …, 2009 | 27 | 2009 |