On the credibility of manet simulations TR Andel, A Yasinsac Computer 39 (7), 48-54, 2006 | 320 | 2006 |
In-vehicle networks: Attacks, vulnerabilities, and proposed solutions P Carsten, TR Andel, M Yampolskiy, JT McDonald Proceedings of the 10th Annual Cyber and Information Security Research …, 2015 | 115 | 2015 |
Cybersecurity issues in robotics GW Clark, MV Doran, TR Andel 2017 IEEE conference on cognitive and computational aspects of situation …, 2017 | 111 | 2017 |
Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing M Yampolskiy, TR Andel, JT McDonald, WB Glisson, A Yasinsac Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 1-9, 2014 | 100 | 2014 |
Surveying security analysis techniques in MANET routing protocols TR Andel, A Yasinsac IEEE Communications Surveys & Tutorials 9 (4), 70-84, 2007 | 81 | 2007 |
Developing a virtualization platform for courses in networking, systems administration and cyber security education KE Stewart, JW Humphries, TR Andel Proceedings of the 2009 spring simulation multiconference, 1-7, 2009 | 63 | 2009 |
Adaptive threat modeling for secure ad hoc routing protocols TR Andel, A Yasinsac Electronic Notes in Theoretical Computer Science 197 (2), 3-14, 2008 | 35 | 2008 |
Compromising a medical mannequin WB Glisson, T Andel, T McDonald, M Jacobs, M Campbell, J Mayr arXiv preprint arXiv:1509.00065, 2015 | 32 | 2015 |
A trust-management toolkit for smart-grid protection systems JE Fadul, KM Hopkinson, TR Andel, CA Sheffield IEEE transactions on power delivery 29 (4), 1768-1779, 2013 | 32 | 2013 |
Comparing the effectiveness of commercial obfuscators against MATE attacks R Manikyam, JT McDonald, WR Mahoney, TR Andel, SH Russ Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016 | 30 | 2016 |
Trust management and security in the future communication-based" smart" electric power grid J Fadul, K Hopkinson, C Sheffield, J Moore, T Andel 2011 44th Hawaii International Conference on System Sciences, 1-10, 2011 | 30 | 2011 |
Exploring security in ZigBee networks LN Whitehurst, TR Andel, JT McDonald Proceedings of the 9th Annual Cyber and Information Security Research …, 2014 | 29 | 2014 |
Legal aspects of protecting intellectual property in additive manufacturing A Brown, M Yampolskiy, J Gatlin, T Andel Critical Infrastructure Protection X: 10th IFIP WG 11.10 International …, 2016 | 28 | 2016 |
Functional polymorphism for intellectual property protection JT McDonald, YC Kim, TR Andel, MA Forbes, J McVicar 2016 IEEE International Symposium on Hardware Oriented Security and Trust …, 2016 | 24 | 2016 |
Automated evaluation of secure route discovery in MANET protocols TR Andel, A Yasinsac International SPIN Workshop on Model Checking of Software, 26-41, 2008 | 24 | 2008 |
The invisible node attack revisited TR Andel, A Yasinsac Proceedings 2007 IEEE SoutheastCon, 686-691, 2007 | 24 | 2007 |
Detecting repackaged android applications using perceptual hashing T Nguyen, JT McDonald, WB Glisson, TR Andel Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020 | 23 | 2020 |
Phase space detection of virtual machine cyber events through hypervisor-level system call analysis JA Dawson, JT McDonald, L Hively, TR Andel, M Yampolskiy, C Hubbard 2018 1st International Conference on Data Intelligence and Security (ICDIS …, 2018 | 22 | 2018 |
On SCADA PLC and fieldbus cyber-security CC Davidson, T Andel, M Yampolskiy, JT McDonald, B Glisson, T Thomas 13th International Conference on Cyber Warfare and Security, 140-149, 2018 | 19 | 2018 |
Using virtualization for cyber security education and experimentation TR Andel, KE Stewart, JW Humphries 14th Colloquium for Information System Security Education (CISSE), 2010 | 19 | 2010 |