Blockchain: properties and misconceptions D Conte de Leon, AQ Stalick, AA Jillepalli, MA Haney, FT Sheldon Asia Pacific Journal of Innovation and Entrepreneurship 11 (3), 286-300, 2017 | 217 | 2017 |
A secure architecture for IoT with supply chain risk management RE Hiromoto, M Haney, A Vakanski 2017 9th IEEE International Conference on Intelligent Data Acquisition and …, 2017 | 75 | 2017 |
Using hybrid attack graphs to model cyber-physical attacks in the Smart Grid PJ Hawrylak, M Haney, M Papa, J Hale 2012 5th International Symposium on Resilient Control Systems, 161-164, 2012 | 56 | 2012 |
ISAAC: The Idaho CPS Smart Grid Cybersecurity Testbed IA Oyewumi, AA Jillepalli, P Richardson, M Ashrafuzzaman, BK Johnson, ... 2019 IEEE Texas Power and Energy Conference (TPEC), 1-6, 2019 | 48 | 2019 |
Security management of cyber physical control systems using NIST SP 800-82r2 AA Jillepalli, FT Sheldon, DC de Leon, M Haney, RK Abercrombie 2017 13th International Wireless Communications and Mobile Computing …, 2017 | 32 | 2017 |
ADLES: specifying, deploying, and sharing hands-on cyber-exercises DC de Leon, CE Goes, MA Haney, AW Krings Computers & Security, 2018 | 31 | 2018 |
An overview of the methodologies for cyber security vulnerability assessments conducted in nuclear power plants J Peterson, M Haney, RA Borrelli Nuclear Engineering and Design 346, 75-84, 2019 | 26 | 2019 |
Industrial Control Systems Security and Resiliency C Reiger, I Ray, Q Zhu, MA Haney Practice and Theory. Springer, Cham, 2019 | 24 | 2019 |
Hybrid extensions for stateful attack graphs G Louthan, M Haney, P Hardwicke, P Hawrylak, J Hale Proceedings of the 9th Annual Cyber and Information Security Research …, 2014 | 20 | 2014 |
A framework for the design and deployment of a scada honeynet M Haney, M Papa Proceedings of the 9th Annual Cyber and Information Security Research …, 2014 | 15 | 2014 |
System, method and apparatus for network security monitoring, information sharing, and collective intelligence M Haney US Patent 10,326,803, 2019 | 12 | 2019 |
Preventing the mistraining of anomaly-based IDSs through ensemble systems C Fellin, M Haney 2014 IEEE World Congress on Services, 66-68, 2014 | 12 | 2014 |
METICS: A holistic cyber physical system model for ieee 14-bus power system security AA Jillepalli, DC de Leon, BK Johnson, Y Chakhchoukh, IA Oyewumi, ... 2018 13th International Conference on Malicious and Unwanted Software …, 2018 | 11 | 2018 |
HESTIA: Adversarial Modeling and Risk Assessment for CPCS AA Jillepalli, DC de Leon, M Ashrafuzzaman, Y Chakhchoukh, ... 2018 14th International Wireless Communications & Mobile Computing …, 2018 | 9 | 2018 |
An architecture for HESTIA: high-level and extensible system for training and infrastructure risk assessment AA Jillepalli, DCD Leon, Y Chakhchoukh, M Ashrafuzzaman, BK Johnson, ... International Journal of Internet of Things and Cyber-Assurance 1 (2), 173-193, 2018 | 9 | 2018 |
Hardening the client-side: A guide to enterprise-level hardening of web browsers AA Jillepalli, DC de Leon, S Steiner, FT Sheldon, MA Haney 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th …, 2017 | 7 | 2017 |
Multidisciplinary Game-based Approach for Generating Student Enthusiasm for Addressing Critical Infrastructure Challenges MTR McJunkin, CG Rieger, A Rege, SK Biswas, M Haney, MJ Santora, ... 2016 ASEE Annual Conference & Exposition, 2016 | 7 | 2016 |
Requirements for IoT Forensic Models: A Review N Almolhis, AM Alashjaee, M Haney Advances in Security, Networks, and Internet of Things, 355-366, 2021 | 6 | 2021 |
Enterprise-level Hardening of Web Browsers for Microsoft Windows AA Jillepalli, DC de Leon, FT Sheldon, MA Haney Int. J. Com. Dig. Sys 7 (5), 2018 | 6 | 2018 |
Measuring the Potential for Victimization in Malicious Content ML Hale, R Gamble, J Hale, M Haney, J Lin, C Walter 2015 IEEE International Conference on Web Services, 305-312, 2015 | 6 | 2015 |