default search action
Adam J. Slagell
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j1]Hui Lin, Adam J. Slagell, Zbigniew T. Kalbarczyk, Peter W. Sauer, Ravishankar K. Iyer:
Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids. IEEE Trans. Smart Grid 9(1): 163-178 (2018) - 2016
- [c19]Key-whan Chung, Valerio Formicola, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Alexander Withers, Adam J. Slagell:
Attacking supercomputers through targeted alteration of environmental control: A data driven case study. CNS 2016: 406-410 - 2015
- [c18]Phuong Cao, Eric C. Badger, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Adam J. Slagell:
Preemptive intrusion detection: theoretical framework and real-world measurements. HotSoS 2015: 5:1-5:12 - [c17]Phuong Cao, Eric C. Badger, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Alexander Withers, Adam J. Slagell:
Towards an unified security testbed and security analytics framework. HotSoS 2015: 24:1-24:2 - [c16]Jonathan Schipp, Jeannette Dopheide, Adam J. Slagell:
ISLET: an isolated, scalable, & lightweight environment for training. XSEDE 2015: 17:1-17:6 - [e1]Scott Campbell, Adam J. Slagell:
Proceedings of the 2015 Workshop on Changing Landscapes in HPC Security, CLHS@HPDC 2015, Portland, Oregon, USA, June 16, 2015. ACM 2015, ISBN 978-1-4503-3572-0 [contents] - 2014
- [c15]Phuong Cao, Key-whan Chung, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Adam J. Slagell:
Preemptive intrusion detection. HotSoS 2014: 21 - [c14]Phuong Cao, Hongyang Li, Klara Nahrstedt, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Adam J. Slagell:
Personalized password guessing: a new security threat. HotSoS 2014: 22 - [c13]Hui Lin, Adam J. Slagell, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster). SIN 2014: 492 - 2013
- [c12]Hui Lin, Adam J. Slagell, Zbigniew Kalbarczyk, Peter W. Sauer, Ravishankar K. Iyer:
Semantic security analysis of SCADA networks to detect malicious control commands in power grids. SEGS@CCS 2013: 29-34 - [c11]Hui Lin, Adam J. Slagell, Catello Di Martino, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol. CSIIRW 2013: 5
2000 – 2009
- 2009
- [c10]Justin King, Kiran Lakkaraju, Adam J. Slagell:
A taxonomy and adversarial model for attacks against network log anonymization. SAC 2009: 1286-1293 - 2008
- [c9]Kiran Lakkaraju, Adam J. Slagell:
Evaluating the utility of anonymized network traces for intrusion detection. SecureComm 2008: 17 - 2007
- [i6]Kiran Lakkaraju, Adam J. Slagell:
Evaluating the Utility of Single Field Anonymization Polices by the IDS Metric : Towards measuring the trade off between Utility and Security. CoRR abs/0712.1224 (2007) - 2006
- [c8]Adam J. Slagell, Rafael Bonilla, William Yurcik:
A survey of PKI components and scalability issues. IPCCC 2006 - [c7]Adam J. Slagell, Kiran Lakkaraju, Katherine Luo:
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs. LISA 2006: 63-77 - [c6]Xiaoxin Yin, William Yurcik, Adam J. Slagell:
VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts. SEC 2006: 284-295 - [c5]Jim Basney, Patrick Flanigan, Jin Heo, Himanshu Khurana, Joe Muggli, Meenal Pant, Adam J. Slagell, Von Welch:
Mithril: Adaptable Security for Survivability in Collaborative Computing Sites. SecureComm 2006: 1-7 - [i5]Katherine Luo, Yifan Li, Charis Ermopoulos, William Yurcik, Adam J. Slagell:
SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting. CoRR abs/cs/0601079 (2006) - [i4]Adam J. Slagell, Kiran Lakkaraju, Katherine Luo:
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs. CoRR abs/cs/0606063 (2006) - 2005
- [c4]Himanshu Khurana, Rafael Bonilla, Adam J. Slagell, Raja Afandi, Hyung-Seok Hahm, Jim Basney:
Scalable Group Key Management with Partially Trusted Controllers. ICN (2) 2005: 662-672 - [c3]Xiaoxin Yin, William Yurcik, Adam J. Slagell:
The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness. IWIA 2005: 141-153 - [c2]Himanshu Khurana, Adam J. Slagell, Rafael Bonilla:
SELS: a secure e-mail list service. SAC 2005: 306-313 - [c1]Kiran Lakkaraju, Ratna Bearavolu, Adam J. Slagell, William Yurcik, Stephen C. North:
Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations. VizSEC 2005: 9 - 2004
- [i3]Adam J. Slagell, William Yurcik:
Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization. CoRR cs.CR/0409005 (2004) - [i2]Adam J. Slagell, Rafael Bonilla:
PKI Scalability Issues. CoRR cs.CR/0409018 (2004) - [i1]Adam J. Slagell:
Known-Plaintext Attack Against a Permutation Based Video. IACR Cryptol. ePrint Arch. 2004: 11 (2004)
Coauthor Index
aka: Zbigniew Kalbarczyk
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint