Author of the publication

Using a Real-Time Cybersecurity Exercise Case Study to Understand Temporal Characteristics of Cyberattacks.

, , , , , , and . SBP-BRiMS, volume 10354 of Lecture Notes in Computer Science, page 127-132. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Adversarial Movement Through Characteristics of Graph Topological Ordering., , and . CyberSA, page 1-6. IEEE, (2018)Examining the Roles of Muhajirahs in the Islamic State via Twitter., and . CyberSA, page 1-8. IEEE, (2019)A Free and Community-Driven Critical Infrastructure Ransomware Dataset., and . Cyber Science, page 25-37. Springer, (2022)A Social Engineering Course Project for Undergraduate Students Across Multiple Disciplines., , and . Cyber Security, page 1-8. IEEE, (2019)Security and Privacy Education for STEM Undergraduates: A Shoulder Surfing Course Project., , and . FIE, page 1-7. IEEE, (2019)Assessment of Group Dynamics During Cyber Crime Through Temporal Network Topology., , and . SBP-BRiMS, volume 10899 of Lecture Notes in Computer Science, page 401-407. Springer, (2018)Pattern discovery in intrusion chains and adversarial movement., , and . CyberSA, page 1-4. IEEE, (2019)Collegiate Social Engineering Capture the Flag Competition., and . eCrime, page 1-11. IEEE, (2021)Factors Impacting Attacker Decision-Making in Power Grid Cyber Attacks.. Critical Infrastructure Protection, volume 417 of IFIP Advances in Information and Communication Technology, page 125-138. Springer, (2013)Predicting Adversarial Cyber-Intrusion Stages Using Autoregressive Neural Networks., , , , , , and . IEEE Intelligent Systems, 33 (2): 29-39 (2018)