John Hale
TitleCited byYear
Learning to coordinate without sharing information
S Sen, M Sekaran, J Hale
AAAI 94, 426-431, 1994
Modeling internet attacks
T Tidwell, R Larson, K Fitch, J Hale
Proceedings of the 2001 IEEE Workshop on Information Assurance and security 59, 2001
Method to inhibit the identification and retrieval of proprietary media via automated search engines utilized in association with computer compatible communications network
JC Hale, GW Manes
US Patent 6,732,180, 2004
A systematic approach to multi-stage network attack analysis
J Dawkins, J Hale
Second IEEE International Information Assurance Workshop, 2004. Proceedings …, 2004
Modeling network attacks: Extending the attack tree paradigm
J Dawkins, C Campbell, J Hale
Workshop on Statistical and Machine Learning Techniques in Computer …, 2002
A genetic algorithm for fragment allocation in a distributed database system
AL Corcoran, J Hale
Proceedings of the 1994 ACM symposium on Applied computing, 247-250, 1994
Securing ss7 telecommunications networks
G Lorenz, T Moore, G Manes, J Hale, S Shenoi
Workshop on Information Assurance and Security 2, 1115, 2001
Analyzing FD inference in relational databases
J Hale, S Shenoi
Data & Knowledge Engineering 18 (2), 167-183, 1996
Qualitative and quantitative analytical techniques for network security assessment
K Clark, S Tyree, J Dawkins, J Hale
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004
Catalytic inference analysis: Detecting inference threats due to knowledge discovery
J Hale, S Shenoi
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
Security policy coordination for heterogeneous information systems
J Hale, P Galiasso, M Papa, S Shenoi
Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99 …, 1999
Using hybrid attack graphs to model cyber-physical attacks in the Smart Grid
PJ Hawrylak, M Haney, M Papa, J Hale
2012 5th International Symposium on Resilient Control Systems, 161-164, 2012
A contextualized model for cross-cultural leadership in West Africa
JR Hale
Proceedings of the Servant Leadership Research Roundtable, 1-25, 2004
Electrical connection system
A Urbaniak, R Koch, T Guenay
US Patent 6,749,459, 2004
Security risks associated with radio frequency identification in medical environments
PJ Hawrylak, N Schimke, J Hale, M Papa
Journal of medical systems 36 (6), 3491-3505, 2012
Security risk metrics: Fusing enterprise objectives and vulnerabilities
K Clark, J Dawkins, J Hale
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop …, 2005
A framework for high assurance security of distributed objects
J Hale, J Threet, S Shenoi
Database Security, 101-119, 1997
Secur (e/ity) management: A continuing uphill climb
J Hale, P Brusil
Journal of Network and Systems Management 15 (4), 525-553, 2007
Formal analysis of e-commerce protocols
M Papa, O Bremer, J Hale, S Shenoi
IEICE TRANSACTIONS on Information and Systems 84 (10), 1313-1323, 2001
Packet sniffing for automated chat room monitoring and evidence preservation
A Meehan, G Manes, L Davis, J Hale, S Shenoi
Workshop on Information Assurance and Security 2, 1045, 2001
The system can't perform the operation now. Try again later.
Articles 1–20