default search action
Frederick T. Sheldon
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon, Sajjan G. Shiva:
Ensembling Supervised and Unsupervised Machine Learning Algorithms for Detecting Distributed Denial of Service Attacks. Algorithms 17(3): 99 (2024) - [j38]Fahad Alqahtani, Mohammed Almutairi, Frederick T. Sheldon:
Cloud Security Using Fine-Grained Efficient Information Flow Tracking. Future Internet 16(4): 110 (2024) - [j37]Mazen Gazzan, Frederick T. Sheldon:
An Incremental Mutual Information-Selection Technique for Early Ransomware Detection. Inf. 15(4): 194 (2024) - [j36]Mazen Gazzan, Frederick T. Sheldon:
Novel Ransomware Detection Exploiting Uncertainty and Calibration Quality Measures Using Deep Learning. Inf. 15(5): 262 (2024) - [j35]Abdullah Alqahtani, Frederick T. Sheldon:
eMIFS: A Normalized Hyperbolic Ransomware Deterrence Model Yielding Greater Accuracy and Overall Performance. Sensors 24(6): 1728 (2024) - [j34]Alexander Joens, Ananth A. Jillepalli, Frederick T. Sheldon:
Trustworthy High-Performance Multiplayer Games with Trust-but-Verify Protocol Sensor Validation. Sensors 24(14): 4737 (2024) - [c84]Saikat Das, Raktim Ranjan Das, Frederick T. Sheldon, Sajjan G. Shiva:
Trusting Classifiers with Interpretable Machine Learning Based Feature Selection Backpropagation. CCWC 2024: 527-533 - 2023
- [j33]Mazen Gazzan, Frederick T. Sheldon:
Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems. Future Internet 15(4): 144 (2023) - [j32]Mazen Gazzan, Frederick T. Sheldon:
An Enhanced Minimax Loss Function Technique in Generative Adversarial Network for Ransomware Behavior Prediction. Future Internet 15(10): 318 (2023) - [j31]Shrooq Algarni, Frederick T. Sheldon:
Systematic Review of Recommendation Systems for Course Selection. Mach. Learn. Knowl. Extr. 5(2): 560-596 (2023) - [j30]Abdullah Alqahtani, Frederick T. Sheldon:
Temporal Data Correlation Providing Enhanced Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation. Sensors 23(9): 4355 (2023) - 2022
- [j29]Ananth A. Jillepalli, Daniel Conte de Leon, Jim Alves-Foss, Clinton L. Jeffery, Frederick T. Sheldon:
A Formal Model and Verification for HESTIA: An Automated, Adversary-Aware Risk Assessment Process for Cyber Infrastructure. IEEE Access 10: 83755-83792 (2022) - [j28]Sultan Ahmed Almalki, Ahmed Abdel-Rahim, Frederick T. Sheldon:
Adaptive IDS for Cooperative Intelligent Transportation Systems Using Deep Belief Networks. Algorithms 15(7): 251 (2022) - [j27]Abdullah Alqahtani, Frederick T. Sheldon:
A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook. Sensors 22(5): 1837 (2022) - [j26]Saikat Das, Sajal Saha, Annita Tahsin Priyoti, Etee Kawna Roy, Frederick T. Sheldon, Anwar Haque, Sajjan G. Shiva:
Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection. IEEE Trans. Netw. Serv. Manag. 19(4): 4821-4833 (2022) - [c83]Sultan Ahmed Almalki, Ahmed Abdel-Rahim, Frederick T. Sheldon:
Disrupting the Cooperative Nature of Intelligent Transportation Systems. AIIoT 2022: 131-137 - 2021
- [j25]Osama AlQahtani, Frederick T. Sheldon:
Validation of VANET message dissemination algorithms otherwise vulnerable to broadcast storms in urban contexts. Trans. Emerg. Telecommun. Technol. 32(10) (2021) - [j24]Khalid Albulayhi, Abdallah A. Smadi, Frederick T. Sheldon, Robert K. Abercrombie:
IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses. Sensors 21(19): 6432 (2021) - [j23]Mohammed A. Aleisa, Abdullah Abuhussein, Faisal Alsubaei, Frederick T. Sheldon:
Examining the Performance of Fog-Aided, Cloud-Centered IoT in a Real-World Environment. Sensors 21(21): 6950 (2021) - [c82]Khalid Albulayhi, Frederick T. Sheldon:
An Adaptive Deep-Ensemble Anomaly-Based Intrusion Detection System for the Internet of Things. AIIoT 2021: 187-196 - [c81]Mazen Gazzan, Abdullah Alqahtani, Frederick T. Sheldon:
Key Factors Influencing the Rise of Current Ransomware Attacks on Industrial Control Systems. CCWC 2021: 1417-1422 - 2020
- [j22]Mohammed A. Aleisa, Abdullah Abuhussein, Frederick T. Sheldon:
Access Control in Fog Computing: Challenges and Research Agenda. IEEE Access 8: 83986-83999 (2020) - [j21]Mohammad Ashrafuzzaman, Saikat Das, Yacine Chakhchoukh, Sajjan G. Shiva, Frederick T. Sheldon:
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning. Comput. Secur. 97: 101994 (2020) - [c80]Abdullah Alqahtani, Mazen Gazzan, Frederick T. Sheldon:
A proposed Crypto-Ransomware Early Detection(CRED) Model using an Integrated Deep Learning and Vector Space Model Approach. CCWC 2020: 275-279 - [c79]Khalid Albulayhi, Abdullah Abuhussein, Faisal Alsubaei, Frederick T. Sheldon:
Fine-Grained Access Control in the Era of Cloud Computing: An Analytical Review. CCWC 2020: 748-755 - [c78]Saikat Das, Deepak Venugopal, Sajjan G. Shiva, Frederick T. Sheldon:
Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack. CSCloud/EdgeCom 2020: 56-61 - [c77]Khalid Albulayhi, Predrag T. Tosic, Frederick T. Sheldon:
G-Model: A Novel Approach to Privacy-Preserving 1: M Microdata Publication. CSCloud/EdgeCom 2020: 88-99 - [c76]Mohammed A. Aleisa, Abdullah Abuhussein, Faisal Alsubaei, Frederick T. Sheldon:
Performance Analysis of Two Cloud-Based IoT Implementations: Empirical Study. CSCloud/EdgeCom 2020: 276-280 - [c75]Khalid Al Makdi, Frederick T. Sheldon, Abdullah Abuhussein:
Trusted Security Model for IDS Using Deep Learning. ICSPIS 2020: 1-4 - [c74]Saikat Das, Namita Agarwal, Deepak Venugopal, Frederick T. Sheldon, Sajjan G. Shiva:
Taxonomy and Survey of Interpretable Machine Learning Method. SSCI 2020: 670-677 - [c73]Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon, Sajjan G. Shiva:
Network Intrusion Detection using Natural Language Processing and Ensemble Machine Learning. SSCI 2020: 829-835 - [c72]Mohammad Ashrafuzzaman, Saikat Das, Ananth A. Jillepalli, Yacine Chakhchoukh, Frederick T. Sheldon:
Elliptic Envelope Based Detection of Stealthy False Data Injection Attacks in Smart Grid Control Systems. SSCI 2020: 1131-1137 - [c71]Salahaldeen Duraibi, Wasim Alhamdani, Frederick T. Sheldon:
Voice Feature Learning using Convolutional Neural Networks Designed to Avoid Replay Attacks. SSCI 2020: 1845-1851
2010 – 2019
- 2019
- [c70]Robert K. Abercrombie, Thomas Ben Ollis, Frederick T. Sheldon, Ananth A. Jillepalli:
Microgrid Disaster Resiliency Analysis: Reducing Costs in Continuity of Operations (COOP) Planning. HICSS 2019: 1-10 - 2018
- [c69]Mohammad Ashrafuzzaman, Hasan Jamil, Yacine Chakhchoukh, Frederick T. Sheldon:
A Best-Effort Damage Mitigation Model for Cyber-Attacks on Smart Grids. COMPSAC (2) 2018: 510-515 - [c68]Hasan M. Jamil, Xin Mou, Robert B. Heckendorn, Clinton L. Jeffery, Frederick T. Sheldon, Cassidy S. Hall, Nina M. Peterson:
Authoring Adaptive Digital Computational Thinking Lessons Using vTutor for Web-Based Learning. ICWL 2018: 125-131 - [c67]Mohammad Ashrafuzzaman, Yacine Chakhchoukh, Ananth A. Jillepalli, Predrag T. Tosic, Daniel Conte de Leon, Frederick T. Sheldon, Brian K. Johnson:
Detecting Stealthy False Data Injection Attacks in Power Grids Using Deep Learning. IWCMC 2018: 219-225 - [c66]Ananth A. Jillepalli, Daniel Conte de Leon, Mohammad Ashrafuzzaman, Yacine Chakhchoukh, Brian K. Johnson, Frederick T. Sheldon, Jim Alves-Foss, Predrag T. Tosic, Michael A. Haney:
HESTIA: Adversarial Modeling and Risk Assessment for CPCS. IWCMC 2018: 226-231 - [c65]Ananth A. Jillepalli, Daniel Conte de Leon, Brian K. Johnson, Yacine Chakhchoukh, Ibukun A. Oyewumi, Mohammad Ashrafuzzaman, Frederick T. Sheldon, Jim Alves-Foss, Michael A. Haney:
METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security. MALWARE 2018: 95-102 - 2017
- [j20]Chen Lin, Zhidong Shen, Qian Chen, Frederick T. Sheldon:
A data integrity verification scheme in mobile cloud computing. J. Netw. Comput. Appl. 77: 146-151 (2017) - [c64]Ananth A. Jillepalli, Daniel Conte de Leon, Stuart Steiner, Frederick T. Sheldon, Michael A. Haney:
Hardening the Client-Side: A Guide to Enterprise-Level Hardening of Web Browsers. DASC/PiCom/DataCom/CyberSciTech 2017: 687-692 - [c63]Frederick T. Sheldon, Robert K. Abercrombie, Xiaohui Cui:
Introduction to Supply Chain Security and Mutual Trust Research Minitrack. HICSS 2017: 1-2 - [c62]Ananth A. Jillepalli, Frederick T. Sheldon, Daniel Conte de Leon, Michael A. Haney, Robert K. Abercrombie:
Security management of cyber physical control systems using NIST SP 800-82r2. IWCMC 2017: 1864-1870 - [c61]Venkata S. Koganti, Mohammad Ashrafuzzaman, Ananth A. Jillepalli, Frederick T. Sheldon:
A virtual testbed for security management of industrial control systems. MALWARE 2017: 85-90 - 2016
- [j19]Qian Chen, Madhulika Trivedi, Sherif Abdelwahed, Thomas H. Morris, Frederick T. Sheldon:
Model-based autonomic security management for cyber-physical infrastructures. Int. J. Crit. Infrastructures 12(4): 273-294 (2016) - [c60]Abdullah Abuhussein, Faisal Alsubaei, Sajjan G. Shiva, Frederick T. Sheldon:
Evaluating Security and Privacy in Cloud Services. COMPSAC 2016: 683-686 - [c59]Abdullah Abuhussein, Sajjan G. Shiva, Frederick T. Sheldon:
CSSR: Cloud Services Security Recommender. SERVICES 2016: 48-55 - [c58]Ananth A. Jillepalli, Daniel Conte de Leon, Stuart Steiner, Frederick T. Sheldon:
HERMES: A high-level policy language for high-granularity enterprise-wide secure browser configuration management. SSCI 2016: 1-9 - [c57]Daniel Conte de Leon, Venkata A. Bhandari, Ananth A. Jillepalli, Frederick T. Sheldon:
Using a knowledge-based security orchestration tool to reduce the risk of browser compromise. SSCI 2016: 1-8 - 2015
- [j18]Qian Chen, Robert K. Abercrombie, Frederick T. Sheldon:
Risk Assessment For Industrial Control Systems Quantifying Availability Using Mean Failure Cost (MFC). J. Artif. Intell. Soft Comput. Res. 5(3): 205 (2015) - [c56]Robert K. Abercrombie, Frederick T. Sheldon, Bob G. Schlicher:
Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems. CISR 2015: 18:1-18:4 - [c55]Robert K. Abercrombie, Frederick T. Sheldon:
Security Analysis of Smart Grid Cyber Physical Infrastructures Using Game Theoretic Simulation. SSCI 2015: 455-462 - 2014
- [c54]Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Quantifying the impact of unavailability in cyber-physical environments. CICS 2014: 26-33 - [c53]Danny Thebeau II, Benjamin Reidy, Ricardo Valerdi, Avinash Gudagi, Hemayamini Kurra, Youssif B. Al-Nashif, Salim Hariri, Frederick T. Sheldon:
Improving Cyber Resiliency of Cloud Application Services by Applying Software Behavior Encryption (SBE). CSER 2014: 62-70 - [c52]Anis Ben Aissa, Latifa Ben Arfa Rabai, Robert K. Abercrombie, Ali Mili, Frederick T. Sheldon:
Quantifying availability in SCADA environments using the cyber security metric MFC. CISR 2014: 81-84 - [c51]Robert K. Abercrombie, Bob G. Schlicher, Frederick T. Sheldon:
Security Analysis of Selected AMI Failure Scenarios Using Agent Based Game Theoretic Simulation. HICSS 2014: 2015-2024 - 2013
- [c50]Robert K. Abercrombie, Frederick T. Sheldon, Katie R. Hauser, Margaret W. Lantz, Ali Mili:
Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA). CSIIRW 2013: 19 - [c49]Michael Duren, Hal Aldridge, Robert K. Abercrombie, Frederick T. Sheldon:
Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructure. CSIIRW 2013: 48 - [c48]Frederick T. Sheldon, Daniel Fetzer, David O. Manz, Jingshan Huang, Stuart Goose, Thomas H. Morris, Jiangbo Dang, Jonathan Kirsch, Dong Wei:
Intrinsically resilient energy control systems. CSIIRW 2013: 63 - [c47]Robert K. Abercrombie, Frederick T. Sheldon, Katie R. Hauser, Margaret W. Lantz, Ali Mili:
Risk Assessment Methodology Based on the NISTIR 7628 Guidelines. HICSS 2013: 1802-1811 - [c46]Claire Vishik, Frederick T. Sheldon, David Ott:
Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment. ISSE 2013: 133-147 - [e5]Frederick T. Sheldon, Annarita Giani, Axel W. Krings, Robert K. Abercrombie:
Cyber Security and Information Intelligence, CSIIRW '13, Oak Ridge, TN, USA, January 8-10, 2013. ACM 2013, ISBN 978-1-4503-1687-3 [contents] - 2012
- [j17]Frederick T. Sheldon, John Mark Weber, Seong-Moo Yoo, W. David Pan:
The Insecurity of Wireless Networks. IEEE Secur. Priv. 10(4): 54-61 (2012) - [j16]Frederick T. Sheldon, Jeffrey Todd McDonald:
Introduction to the special issue on cyber security and management. Inf. Syst. E Bus. Manag. 10(4): 429-431 (2012) - [j15]Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Defining and computing a value based cyber-security measure. Inf. Syst. E Bus. Manag. 10(4): 433-453 (2012) - [c45]Frederick T. Sheldon, Jingshan Huang, Jiangbo Dang, Daniel Fetzer, Stuart Goose, Jonathan Kirsch, David O. Manz, Thomas H. Morris, Dong Wei:
Intrinsically Resilient Energy Control Systems. STIDS 2012: 96-103 - 2011
- [j14]Lee M. Hively, Frederick T. Sheldon, Anna Cinzia Squicciarini:
Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor. IEEE Secur. Priv. 9(4): 14-23 (2011) - [c44]Robert K. Abercrombie, Erik M. Ferragut, Frederick T. Sheldon, Michael R. Grimaila:
Addressing the need for independence in the CSE model. CICS 2011: 68-75 - [c43]Dipankar Dasgupta, Mohd. Hassan Ali, Robert K. Abercrombie, Bob G. Schlicher, Frederick T. Sheldon, Marco Carvalho:
Secure VM for monitoring industrial process controllers. CSIIRW 2011: 39 - [c42]Zhanshan (Sam) Ma, Hongju (Daisy) Chen, Jiajin Zhang, Axel W. Krings, Frederick T. Sheldon:
Has the cyber warfare threat been overstated?: a cheap talk game-theoretic analysis on the Google-hacking claim? CSIIRW 2011: 42 - [c41]Robert K. Abercrombie, Frederick T. Sheldon, Hal Aldridge, Michael Duren, Tracy Ricci, Elisa Bertino, N. Athula Kulatunga, Uditha Navaratne:
Secure cryptographic key management system (CKMS) considerations for smart grid devices. CSIIRW 2011: 59 - [c40]Yoohwan Kim, Frederick T. Sheldon:
Anomaly detection in multiple scale for insider threat analysis. CSIIRW 2011: 77 - [c39]Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Validating Cyber Security Requirements: A Case Study. HICSS 2011: 1-10 - [e4]Frederick T. Sheldon, Robert K. Abercrombie, Axel W. Krings:
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2011, Oak Ridge, TN, USA, October 12-14, 2011. ACM 2011, ISBN 978-1-4503-0945-5 [contents] - 2010
- [j13]Frederick T. Sheldon, Claire Vishik:
Moving Toward Trustworthy Systems: R&D Essentials. Computer 43(9): 31-40 (2010) - [j12]Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Quantifying security threats and their potential impacts: a case study. Innov. Syst. Softw. Eng. 6(4): 269-281 (2010) - [c38]Hamed Okhravi, Frederick T. Sheldon:
Data diodes in support of trustworthy cyber infrastructure. CSIIRW 2010: 23 - [c37]Zhanshan (Sam) Ma, Frederick T. Sheldon, Axel W. Krings:
The handicap principle, strategic information warfare and the paradox of asymmetry. CSIIRW 2010: 35 - [c36]Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Modeling stakeholder/value dependency through mean failure cost. CSIIRW 2010: 55 - [c35]Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Software requirements for a system to compute mean failure cost. CSIIRW 2010: 73 - [c34]Robert K. Abercrombie, Frederick T. Sheldon, Michael R. Grimaila:
A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance - Applying Cyber Security Econometrics System (CSES) to Mission Assurance Analysis Protocol (MAAP). SocialCom/PASSAT 2010: 1153-1158 - [e3]Frederick T. Sheldon, Stacy J. Prowell, Robert K. Abercrombie, Axel W. Krings:
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2010, Oak Ridge, TN, USA, April 21-23, 2010. ACM 2010, ISBN 978-1-4503-0017-9 [contents]
2000 – 2009
- 2009
- [j11]Yoshito Kanamori, Seong-Moo Yoo, Don A. Gregory, Frederick T. Sheldon:
Authentication Protocol Using Quantum Superposition States. Int. J. Netw. Secur. 9(2): 101-108 (2009) - [c33]Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Managing complex IT security processes with value based measures. CICS 2009: 69-75 - [c32]John McHugh, Robert C. Armstrong, Thomas A. Longstaff, Daniel Quinlan, Frederick T. Sheldon, Deborah A. Frincke:
DOE grass roots panel. CSIIRW 2009: 11 - [c31]Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Quantifying security threats and their impact. CSIIRW 2009: 26 - [c30]Zhanshan (Sam) Ma, Axel W. Krings, Frederick T. Sheldon:
An outline of the three-layer survivability analysis architecture for strategic information warfare research. CSIIRW 2009: 28 - [c29]Ali Mili, Frederick T. Sheldon:
Challenging the Mean Time to Failure: Measuring Dependability as a Mean Failure Cost. HICSS 2009: 1-10 - [c28]Frederick T. Sheldon, Robert K. Abercrombie, Ali Mili:
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission. HICSS 2009: 1-10 - [e2]Frederick T. Sheldon, Greg Peterson, Axel W. Krings, Robert K. Abercrombie, Ali Mili:
Fifth Cyber Security and Information Intelligence Research Workshop, CSIIRW '09, Knoxville, TN, USA, April 13-15, 2009. ACM 2009, ISBN 978-1-60558-518-5 [contents] - 2008
- [c27]Joseph P. Trien, Robert K. Abercrombie, Frederick T. Sheldon:
4th annual cyber security and information intelligence research workshop. CSIIRW 2008: 14:1-14:5 - [c26]Frederick T. Sheldon, Robert K. Abercrombie, Ali Mili:
Evaluating security controls based on key performance indicators and stakeholder mission. CSIIRW 2008: 41:1-41:11 - [c25]Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value. HASE 2008: 479-482 - [e1]Frederick T. Sheldon, Axel W. Krings, Robert K. Abercrombie, Ali Mili:
Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, Oak Ridge, Tennessee, USA, May 12-14, 2008. ACM 2008, ISBN 978-1-60558-098-2 [contents] - 2007
- [c24]Ali Mili, Frederick T. Sheldon:
Measuring Reliability as a Mean Failure Cost. HASE 2007: 403-404 - [c23]Chia-En Lin, Krishna M. Kavi, Frederick T. Sheldon, Kris M. Daley, Robert K. Abercrombie:
A Methodology to Evaluate Agent Oriented Software Engineering Techniques. HICSS 2007: 60 - [c22]Ali Mili, Alex Vinokurov, Lamia Labed Jilani, Frederick T. Sheldon, Rahma Ben Ayed:
Towards an Engineering Discipline of Computational Society. HICSS 2007: 281 - 2006
- [j10]Ali Mili, Frederick T. Sheldon, Lamia Labed Jilani, Alex Vinokurov, Alexander Thomasian, Rahma Ben Ayed:
Modeling security as a dependability attribute: a refinement-based approach. Innov. Syst. Softw. Eng. 2(1): 39-48 (2006) - [j9]Frederick T. Sheldon, Hong Chung:
Measuring the complexity of class diagrams in reverse engineering. J. Softw. Maintenance Res. Pract. 18(5): 333-350 (2006) - [c21]Ali Mili, Lan Wu, Frederick T. Sheldon, Mark Shereshevsky, Jules Desharnais:
Modeling Redundancy: Quantitative and Qualitative Models. AICCSA 2006: 1-8 - [c20]Yoshito Kanamori, Seong-Moo Yoo, Frederick T. Sheldon:
Bank Transfer over Quantum Channel with Digital Checks. GLOBECOM 2006 - 2005
- [j8]Ali Mili, Frederick T. Sheldon, Fatma Mili, Jules Desharnais:
Recoverability preservation: a measure of last resort. Innov. Syst. Softw. Eng. 1(1): 54-62 (2005) - [c19]Yoshito Kanamori, Seong-Moo Yoo, Don A. Gregory, Frederick T. Sheldon:
On quantum authentication protocols. GLOBECOM 2005: 5 - [c18]Ali Mili, Frederick T. Sheldon, Fatma Mili, Mark Shereshevsky, Jules Desharnais:
Perspectives on Redundancy: Applications to Software Certification. HICSS 2005 - [c17]Frederick T. Sheldon, Stephen Gordon Batsell, Stacy J. Prowell, Michael A. Langston:
Position Statement: Methodology to Support Dependable Survivable Cyber-Secure Infrastructures. HICSS 2005 - 2004
- [j7]Frederick T. Sheldon, Thomas E. Potok, Krishna M. Kavi:
Multi-Agent System Case Studies in Command and Control, Information Fusion and Datat Managment. Informatica (Slovenia) 28(1): 78-89 (2004) - [j6]Hye Yeon Kim, Frederick T. Sheldon:
Testing Software Requirements with Z and Statecharts Applied to an Embedded Control System. Softw. Qual. J. 12(3): 231-264 (2004) - [c16]Frederick T. Sheldon, Thomas E. Potok, Andy Loebl, Axel W. Krings, Paul W. Oman:
Managing Secure Survivable Critical Infrastructures to Avoid Vulnerabilities. HASE 2004: 293-296 - [c15]Frederick T. Sheldon, Kshamta Jerath:
Assessing the effect of failure severity, coincident failures and usage-profiles on the reliability of embedded control systems. SAC 2004: 826-833 - 2003
- [c14]Thomas E. Potok, Laurence R. Phillips, Robert Pollock, Andy Loebl, Frederick T. Sheldon:
Suitability of Agent-Based Systems for Command and Control in Fault-Tolerant, Safety-Critical Responsive Decision Networks. PDCS 2003: 283-290 - [c13]Hye Yeon Kim, Kshamta Jerath, Frederick T. Sheldon:
Assessment of High Integrity Software Components for Completeness, Consistency, Fault-Tolerance, and Reliability. Component-Based Software Quality 2003: 259-286 - [c12]Frederick T. Sheldon, Mark T. Elmore, Thomas E. Potok:
An Ontology-Based Software Agent System Case Study. ITCC 2003: 500-506 - 2002
- [j5]Frederick T. Sheldon, Kshamta Jerath, Hong Chung:
Metrics for maintainability of class inheritance hierarchies. J. Softw. Maintenance Res. Pract. 14(3): 147-160 (2002) - [c11]Frederick T. Sheldon, Kshamta Jerath, Young-Jik Kwon, Young-Wook Baik:
Case Study: Implementing a Web Based Auction System Using UML and Component-Based Programming. COMPSAC 2002: 211-216 - [c10]Frederick T. Sheldon, Kshamta Jerath, Stefan Greiner:
Examining Coincident Failures and Usage Profiles in Reliability Analysis of an Embedded Vehicle Sub-System. ESM 2002: 558-563 - [c9]Frederick T. Sheldon, Kshamta Jerath, Orest Pilskalns, Young-Jik Kwon, Woo-Hun Kim, Hong Chung:
Case Study: B2B E-Commerce System Specification and Implementation Employing Use-Case Diagrams, Digital Signatures and XML. ISMSE 2002: 106-113 - 2001
- [j4]Frederick T. Sheldon, Gaoyan Xie, Orest Pilskalns, Zhihe Zhou:
A Review of Some Rigorous Software Design and Analysis Tools. Softw. Focus 2(4): 140-150 (2001) - [c8]Frederick T. Sheldon, Hye Yeon Kim, Zhihe Zhou:
A Case Study: Validation of Guidance Control Software Requirements for Completeness, Consistency and Fault Tolerance. PRDC 2001: 311-318 - 2000
- [c7]Frederick T. Sheldon, Stefan Greiner, Matthias Benzinger:
Specification, Safety and Reliability Analysis Using Stochastic Petri Net Models. IWSSD 2000: 123-132
1990 – 1999
- 1999
- [j3]Frederick T. Sheldon, Stefan Greiner:
Composing, analyzing and validating software models to assess the performability of competing design candidates. Ann. Softw. Eng. 8: 239-287 (1999) - [c6]David A. Owens, Frederick T. Sheldon:
Tool-Based Approach to Distributed Database Design: Includes Web-Based Forms Design for Access to Academic Affairs Data. SAC 1999: 227-231 - 1998
- [c5]Frederick T. Sheldon:
Analysis of Real-Time Concurrent System Models based on CSP Using Stochastic Petri Nets. ESM 1998: 776-783 - 1996
- [j2]Krishna M. Kavi, Frederick T. Sheldon, Sherman Reed:
Specification and Analysis of Real-Time Systems Using CSP and Petri Nets. Int. J. Softw. Eng. Knowl. Eng. 6(2): 229-248 (1996) - 1995
- [c4]Krishna M. Kavi, Frederick T. Sheldon, Behrooz A. Shirazi, Ali R. Hurson:
Reliability analysis of CSP specifications using Petri nets and Markov processes. HICSS (2) 1995: 516-524 - 1994
- [c3]Krishna M. Kavi, Frederick T. Sheldon:
Specification of Stochastic Properties with CSP. ICPADS 1994: 288-295 - 1993
- [c2]Frederick T. Sheldon, Hsing Mei, Seung-Min Yang:
Reliability prediction of distributed embedded fault-tolerant systems. ISSRE 1993: 92-102 - 1992
- [j1]Frederick T. Sheldon, Krishna M. Kavi, Robert C. Tausworthe, James T. Yu, Ralph Brettschneider, William W. Everett:
Reliability Measurement: From Theory to Practice. IEEE Softw. 9(4): 13-20 (1992) - [c1]Frederick T. Sheldon, Seung-Min Yang, Trina L. Bornejko:
Simulation-Based Analysis for Real-Time Systems Development. NATO ASI RTC 1992: 720-722
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint