Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Adam J. Slagell
@article{DBLP:journals/tsg/LinSKSI18, author = {Hui Lin and Adam J. Slagell and Zbigniew T. Kalbarczyk and Peter W. Sauer and Ravishankar K. Iyer}, title = {Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids}, journal = {{IEEE} Trans. Smart Grid}, volume = {9}, number = {1}, pages = {163--178}, year = {2018}, url = {https://doi.org/10.1109/TSG.2016.2547742}, doi = {10.1109/TSG.2016.2547742}, timestamp = {Wed, 03 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsg/LinSKSI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChungFKIWS16, author = {Key{-}whan Chung and Valerio Formicola and Zbigniew T. Kalbarczyk and Ravishankar K. Iyer and Alexander Withers and Adam J. Slagell}, title = {Attacking supercomputers through targeted alteration of environmental control: {A} data driven case study}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {406--410}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860528}, doi = {10.1109/CNS.2016.7860528}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChungFKIWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/CaoBKIS15, author = {Phuong Cao and Eric C. Badger and Zbigniew T. Kalbarczyk and Ravishankar K. Iyer and Adam J. Slagell}, editor = {David M. Nicol}, title = {Preemptive intrusion detection: theoretical framework and real-world measurements}, booktitle = {Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015}, pages = {5:1--5:12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2746194.2746199}, doi = {10.1145/2746194.2746199}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/CaoBKIS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/CaoBKIWS15, author = {Phuong Cao and Eric C. Badger and Zbigniew T. Kalbarczyk and Ravishankar K. Iyer and Alexander Withers and Adam J. Slagell}, editor = {David M. Nicol}, title = {Towards an unified security testbed and security analytics framework}, booktitle = {Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015}, pages = {24:1--24:2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2746194.2746218}, doi = {10.1145/2746194.2746218}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/CaoBKIWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/xsede/SchippDS15, author = {Jonathan Schipp and Jeannette Dopheide and Adam J. Slagell}, editor = {Gregory D. Peterson}, title = {{ISLET:} an isolated, scalable, {\&} lightweight environment for training}, booktitle = {Proceedings of the 2015 {XSEDE} Conference: Scientific Advancements Enabled by Enhanced Cyberinfrastructure, St. Louis, MO, USA, July 26 - 30, 2015}, pages = {17:1--17:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2792745.2792762}, doi = {10.1145/2792745.2792762}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/xsede/SchippDS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/hpdc/2015clhs, editor = {Scott Campbell and Adam J. Slagell}, title = {Proceedings of the 2015 Workshop on Changing Landscapes in {HPC} Security, CLHS@HPDC 2015, Portland, Oregon, USA, June 16, 2015}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2752499}, doi = {10.1145/2752499}, isbn = {978-1-4503-3572-0}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpdc/2015clhs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/CaoCKIS14, author = {Phuong Cao and Key{-}whan Chung and Zbigniew T. Kalbarczyk and Ravishankar K. Iyer and Adam J. Slagell}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Preemptive intrusion detection}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {21}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600197}, doi = {10.1145/2600176.2600197}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/CaoCKIS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/CaoLNKIS14, author = {Phuong Cao and Hongyang Li and Klara Nahrstedt and Zbigniew T. Kalbarczyk and Ravishankar K. Iyer and Adam J. Slagell}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Personalized password guessing: a new security threat}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {22}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600198}, doi = {10.1145/2600176.2600198}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/CaoLNKIS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/LinSKI14, author = {Hui Lin and Adam J. Slagell and Zbigniew T. Kalbarczyk and Ravishankar K. Iyer}, editor = {Ron Poet and Muttukrishnan Rajarajan}, title = {Semantic Security Analysis of {SCADA} Networks to Detect Malicious Control Commands in Power Grids (Poster)}, booktitle = {Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014}, pages = {492}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2659651.2659746}, doi = {10.1145/2659651.2659746}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/LinSKI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LinSKSI13, author = {Hui Lin and Adam J. Slagell and Zbigniew Kalbarczyk and Peter W. Sauer and Ravishankar K. Iyer}, editor = {Benessa Defend and Klaus Kursawe}, title = {Semantic security analysis of {SCADA} networks to detect malicious control commands in power grids}, booktitle = {SEGS'13, Proceedings of the 2013 {ACM} Workshop on Smart Energy Grid Security, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {29--34}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516930.2516947}, doi = {10.1145/2516930.2516947}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LinSKSI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/LinSMKI13, author = {Hui Lin and Adam J. Slagell and Catello Di Martino and Zbigniew Kalbarczyk and Ravishankar K. Iyer}, editor = {Frederick T. Sheldon and Annarita Giani and Axel W. Krings and Robert K. Abercrombie}, title = {Adapting Bro into {SCADA:} building a specification-based intrusion detection system for the {DNP3} protocol}, booktitle = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge, TN, USA, January 8-10, 2013}, pages = {5}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2459976.2459982}, doi = {10.1145/2459976.2459982}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/LinSMKI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/KingLS09, author = {Justin King and Kiran Lakkaraju and Adam J. Slagell}, editor = {Sung Y. Shin and Sascha Ossowski}, title = {A taxonomy and adversarial model for attacks against network log anonymization}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009}, pages = {1286--1293}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1529282.1529572}, doi = {10.1145/1529282.1529572}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/KingLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LakkarajuS08, author = {Kiran Lakkaraju and Adam J. Slagell}, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {Evaluating the utility of anonymized network traces for intrusion detection}, booktitle = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, pages = {17}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1460877.1460899}, doi = {10.1145/1460877.1460899}, timestamp = {Tue, 06 Nov 2018 16:58:12 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/LakkarajuS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0712-1224, author = {Kiran Lakkaraju and Adam J. Slagell}, title = {Evaluating the Utility of Single Field Anonymization Polices by the {IDS} Metric : Towards measuring the trade off between Utility and Security}, journal = {CoRR}, volume = {abs/0712.1224}, year = {2007}, url = {http://arxiv.org/abs/0712.1224}, eprinttype = {arXiv}, eprint = {0712.1224}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0712-1224.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/SlagellBY06, author = {Adam J. Slagell and Rafael Bonilla and William Yurcik}, title = {A survey of {PKI} components and scalability issues}, booktitle = {Proceedings of the 25th {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2006, April 10-12, 2006, Phoenix, Arizona, {USA}}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/.2006.1629442}, doi = {10.1109/.2006.1629442}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/SlagellBY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/SlagellLL06, author = {Adam J. Slagell and Kiran Lakkaraju and Katherine Luo}, editor = {William LeFebvre}, title = {{FLAIM:} {A} Multi-level Anonymization Framework for Computer and Network Logs}, booktitle = {Proceedings of the 20th Conference on Systems Administration {(LISA} 2006), Washington, DC, USA, December 3-8, 2006}, pages = {63--77}, publisher = {{USENIX}}, year = {2006}, url = {http://www.usenix.org/events/lisa06/tech/slagell.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lisa/SlagellLL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/YinYS06, author = {Xiaoxin Yin and William Yurcik and Adam J. Slagell}, editor = {Simone Fischer{-}H{\"{u}}bner and Kai Rannenberg and Louise Yngstr{\"{o}}m and Stefan Lindskog}, title = {\emph{VisFlowCluster-IP}: Connectivity-Based Visual Clustering of Network Hosts}, booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP} {TC-11} 21st International Information Security Conference {(SEC} 2006), 22-24 May 2006, Karlstad, Sweden}, series = {{IFIP}}, volume = {201}, pages = {284--295}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-33406-8\_24}, doi = {10.1007/0-387-33406-8\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/YinYS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/BasneyFHKMPSW06, author = {Jim Basney and Patrick Flanigan and Jin Heo and Himanshu Khurana and Joe Muggli and Meenal Pant and Adam J. Slagell and Von Welch}, title = {Mithril: Adaptable Security for Survivability in Collaborative Computing Sites}, booktitle = {Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006}, pages = {1--7}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/SECCOMW.2006.359560}, doi = {10.1109/SECCOMW.2006.359560}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/BasneyFHKMPSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0601079, author = {Katherine Luo and Yifan Li and Charis Ermopoulos and William Yurcik and Adam J. Slagell}, title = {{SCRUB-PA:} {A} Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting}, journal = {CoRR}, volume = {abs/cs/0601079}, year = {2006}, url = {http://arxiv.org/abs/cs/0601079}, eprinttype = {arXiv}, eprint = {cs/0601079}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0601079.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0606063, author = {Adam J. Slagell and Kiran Lakkaraju and Katherine Luo}, title = {{FLAIM:} {A} Multi-level Anonymization Framework for Computer and Network Logs}, journal = {CoRR}, volume = {abs/cs/0606063}, year = {2006}, url = {http://arxiv.org/abs/cs/0606063}, eprinttype = {arXiv}, eprint = {cs/0606063}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0606063.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icn/KhuranaBSAHB05, author = {Himanshu Khurana and Rafael Bonilla and Adam J. Slagell and Raja Afandi and Hyung{-}Seok Hahm and Jim Basney}, editor = {Pascal Lorenz and Petre Dini}, title = {Scalable Group Key Management with Partially Trusted Controllers}, booktitle = {Networking - {ICN} 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3421}, pages = {662--672}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31957-3\_75}, doi = {10.1007/978-3-540-31957-3\_75}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/icn/KhuranaBSAHB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/YinYS05, author = {Xiaoxin Yin and William Yurcik and Adam J. Slagell}, title = {The Design of VisFlowConnect-IP: {A} Link Analysis System for {IP} Security Situational Awareness}, booktitle = {Proceedings of the 3rd {IEEE} International Workshop on Information Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}}, pages = {141--153}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IWIA.2005.17}, doi = {10.1109/IWIA.2005.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/YinYS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/KhuranaSB05, author = {Himanshu Khurana and Adam J. Slagell and Rafael Bonilla}, editor = {Hisham Haddad and Lorie M. Liebrock and Andrea Omicini and Roger L. Wainwright}, title = {{SELS:} a secure e-mail list service}, booktitle = {Proceedings of the 2005 {ACM} Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005}, pages = {306--313}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1066677.1066752}, doi = {10.1145/1066677.1066752}, timestamp = {Tue, 06 Nov 2018 11:06:45 +0100}, biburl = {https://dblp.org/rec/conf/sac/KhuranaSB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/LakkarajuBSYN05, author = {Kiran Lakkaraju and Ratna Bearavolu and Adam J. Slagell and William Yurcik and Stephen C. North}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {9}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.3}, doi = {10.1109/VIZSEC.2005.3}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/LakkarajuBSYN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-0409005, author = {Adam J. Slagell and William Yurcik}, title = {Sharing Computer Network Logs for Security and Privacy: {A} Motivation for New Methodologies of Anonymization}, journal = {CoRR}, volume = {cs.CR/0409005}, year = {2004}, url = {http://arxiv.org/abs/cs.CR/0409005}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0409005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-0409018, author = {Adam J. Slagell and Rafael Bonilla}, title = {{PKI} Scalability Issues}, journal = {CoRR}, volume = {cs.CR/0409018}, year = {2004}, url = {http://arxiv.org/abs/cs.CR/0409018}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0409018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Slagell04, author = {Adam J. Slagell}, title = {Known-Plaintext Attack Against a Permutation Based Video}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2004}, url = {http://eprint.iacr.org/2004/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Slagell04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.