default search action
Robert K. Abercrombie
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j5]Khalid Albulayhi, Abdallah A. Smadi, Frederick T. Sheldon, Robert K. Abercrombie:
IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses. Sensors 21(19): 6432 (2021)
2010 – 2019
- 2019
- [c30]Robert K. Abercrombie, Thomas Ben Ollis, Frederick T. Sheldon, Ananth A. Jillepalli:
Microgrid Disaster Resiliency Analysis: Reducing Costs in Continuity of Operations (COOP) Planning. HICSS 2019: 1-10 - 2017
- [c29]Frederick T. Sheldon, Robert K. Abercrombie, Xiaohui Cui:
Introduction to Supply Chain Security and Mutual Trust Research Minitrack. HICSS 2017: 1-2 - [c28]Ananth A. Jillepalli, Frederick T. Sheldon, Daniel Conte de Leon, Michael A. Haney, Robert K. Abercrombie:
Security management of cyber physical control systems using NIST SP 800-82r2. IWCMC 2017: 1864-1870 - 2016
- [c27]Bob G. Schlicher, Lawrence P. MacIntyre, Robert K. Abercrombie:
Towards Reducing the Data Exfiltration Surface for the Insider Threat. HICSS 2016: 2749-2758 - 2015
- [j4]Qian Chen, Robert K. Abercrombie, Frederick T. Sheldon:
Risk Assessment For Industrial Control Systems Quantifying Availability Using Mean Failure Cost (MFC). J. Artif. Intell. Soft Comput. Res. 5(3): 205 (2015) - [c26]Mohammad Ashraf Hossain Sadi, Mohd. Hassan Ali, Dipankar Dasgupta, Robert K. Abercrombie:
OPNET/Simulink Based Testbed for Disturbance Detection in the Smart Grid. CISR 2015: 17:1-17:4 - [c25]Robert K. Abercrombie, Frederick T. Sheldon, Bob G. Schlicher:
Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems. CISR 2015: 18:1-18:4 - [c24]Bob G. Schlicher, James J. Kulesz, Robert K. Abercrombie, Kara L. Kruse:
A Computing Environment to Support Repeatable Scientific Big Data Experimentation of World-Wide Scientific Literature. ISSI 2015 - [c23]Robert K. Abercrombie, Frederick T. Sheldon:
Security Analysis of Smart Grid Cyber Physical Infrastructures Using Game Theoretic Simulation. SSCI 2015: 455-462 - [c22]Mohammad Ashraf Hossain Sadi, Mohd. Hasan Ali, Dipankar Dasgupta, Robert K. Abercrombie, Shubhalaxmi Kher:
Co-Simulation Platform for Characterizing Cyber Attacks in Cyber Physical Systems. SSCI 2015: 1244-1251 - 2014
- [c21]Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Quantifying the impact of unavailability in cyber-physical environments. CICS 2014: 26-33 - [c20]Anis Ben Aissa, Latifa Ben Arfa Rabai, Robert K. Abercrombie, Ali Mili, Frederick T. Sheldon:
Quantifying availability in SCADA environments using the cyber security metric MFC. CISR 2014: 81-84 - [c19]Robert K. Abercrombie, Bob G. Schlicher, Frederick T. Sheldon:
Security Analysis of Selected AMI Failure Scenarios Using Agent Based Game Theoretic Simulation. HICSS 2014: 2015-2024 - [e6]Robert K. Abercrombie, Jeffrey Todd McDonald:
Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014. ACM 2014, ISBN 978-1-4503-2812-8 [contents] - 2013
- [c18]Robert K. Abercrombie, Frederick T. Sheldon, Katie R. Hauser, Margaret W. Lantz, Ali Mili:
Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA). CSIIRW 2013: 19 - [c17]Michael Duren, Hal Aldridge, Robert K. Abercrombie, Frederick T. Sheldon:
Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructure. CSIIRW 2013: 48 - [c16]Robert K. Abercrombie, Frederick T. Sheldon, Katie R. Hauser, Margaret W. Lantz, Ali Mili:
Risk Assessment Methodology Based on the NISTIR 7628 Guidelines. HICSS 2013: 1802-1811 - [c15]Bob G. Schlicher, Robert K. Abercrombie, Lee M. Hively:
Conceptual framework to enable early warning of relevant phenomena "Emerging phenomena and big data". ISI 2013: 227-229 - [e5]Frederick T. Sheldon, Annarita Giani, Axel W. Krings, Robert K. Abercrombie:
Cyber Security and Information Intelligence, CSIIRW '13, Oak Ridge, TN, USA, January 8-10, 2013. ACM 2013, ISBN 978-1-4503-1687-3 [contents] - 2012
- [j3]Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Defining and computing a value based cyber-security measure. Inf. Syst. E Bus. Manag. 10(4): 433-453 (2012) - [j2]Robert K. Abercrombie, Akaninyene W. Udoeyop, Bob G. Schlicher:
A study of scientometric methods to identify emerging technologies via modeling of milestones. Scientometrics 91(2): 327-342 (2012) - 2011
- [c14]Robert K. Abercrombie, Erik M. Ferragut, Frederick T. Sheldon, Michael R. Grimaila:
Addressing the need for independence in the CSE model. CICS 2011: 68-75 - [c13]Dipankar Dasgupta, Mohd. Hassan Ali, Robert K. Abercrombie, Bob G. Schlicher, Frederick T. Sheldon, Marco Carvalho:
Secure VM for monitoring industrial process controllers. CSIIRW 2011: 39 - [c12]Robert K. Abercrombie, Frederick T. Sheldon, Hal Aldridge, Michael Duren, Tracy Ricci, Elisa Bertino, N. Athula Kulatunga, Uditha Navaratne:
Secure cryptographic key management system (CKMS) considerations for smart grid devices. CSIIRW 2011: 59 - [c11]Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Validating Cyber Security Requirements: A Case Study. HICSS 2011: 1-10 - [e4]Frederick T. Sheldon, Robert K. Abercrombie, Axel W. Krings:
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2011, Oak Ridge, TN, USA, October 12-14, 2011. ACM 2011, ISBN 978-1-4503-0945-5 [contents] - 2010
- [j1]Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Quantifying security threats and their potential impacts: a case study. Innov. Syst. Softw. Eng. 6(4): 269-281 (2010) - [c10]Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Modeling stakeholder/value dependency through mean failure cost. CSIIRW 2010: 55 - [c9]Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Software requirements for a system to compute mean failure cost. CSIIRW 2010: 73 - [c8]Robert K. Abercrombie, Frederick T. Sheldon, Michael R. Grimaila:
A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance - Applying Cyber Security Econometrics System (CSES) to Mission Assurance Analysis Protocol (MAAP). SocialCom/PASSAT 2010: 1153-1158 - [e3]Frederick T. Sheldon, Stacy J. Prowell, Robert K. Abercrombie, Axel W. Krings:
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2010, Oak Ridge, TN, USA, April 21-23, 2010. ACM 2010, ISBN 978-1-4503-0017-9 [contents]
2000 – 2009
- 2009
- [c7]Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Managing complex IT security processes with value based measures. CICS 2009: 69-75 - [c6]Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Quantifying security threats and their impact. CSIIRW 2009: 26 - [c5]Frederick T. Sheldon, Robert K. Abercrombie, Ali Mili:
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission. HICSS 2009: 1-10 - [e2]Frederick T. Sheldon, Greg Peterson, Axel W. Krings, Robert K. Abercrombie, Ali Mili:
Fifth Cyber Security and Information Intelligence Research Workshop, CSIIRW '09, Knoxville, TN, USA, April 13-15, 2009. ACM 2009, ISBN 978-1-60558-518-5 [contents] - 2008
- [c4]Joseph P. Trien, Robert K. Abercrombie, Frederick T. Sheldon:
4th annual cyber security and information intelligence research workshop. CSIIRW 2008: 14:1-14:5 - [c3]Frederick T. Sheldon, Robert K. Abercrombie, Ali Mili:
Evaluating security controls based on key performance indicators and stakeholder mission. CSIIRW 2008: 41:1-41:11 - [c2]Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value. HASE 2008: 479-482 - [e1]Frederick T. Sheldon, Axel W. Krings, Robert K. Abercrombie, Ali Mili:
Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, Oak Ridge, Tennessee, USA, May 12-14, 2008. ACM 2008, ISBN 978-1-60558-098-2 [contents] - 2007
- [c1]Chia-En Lin, Krishna M. Kavi, Frederick T. Sheldon, Kris M. Daley, Robert K. Abercrombie:
A Methodology to Evaluate Agent Oriented Software Engineering Techniques. HICSS 2007: 60
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint