Follow
Adam Bryant
Title
Cited by
Cited by
Year
Understanding How Reverse Engineers Make Sense of Programs from Assembly Language Representations
AR Bryant
Air Force Institute of Technology, Wright-Patterson AFB, OH, Graduate School …, 2012
232012
Ecological interface design for computer network defense
KB Bennett, A Bryant, C Sushereba
Human factors 60 (5), 610-625, 2018
212018
Software reverse engineering as a sensemaking task
A Bryant, R Mills, M Grimaila, G Peterson
Journal of Information Assurance and Security 6 (6), 483--494, 2011
162011
Redir: Automated static detection of obfuscated anti-debugging techniques
AJ Smith, RF Mills, AR Bryant, GL Peterson, MR Grimaila
2014 International Conference on Collaboration Technologies and Systems (CTS …, 2014
142014
Analyzing executable binary code without detection
J Raber, M Cheatham, J Cheatham, A Bryant, B Krumheuer, R Shinkle
US Patent App. 13/764,332, 2013
132013
Synchron-ITS: an interactive tutoring system to teach process synchronization and shared memory concepts in an operating systems course
MK Putchala, AR Bryant
2016 International Conference on Collaboration Technologies and Systems (CTS …, 2016
102016
Visually guided flow tracking in software-defined networking
T Post, T Wischgoll, AR Bryant, B Hamann, P Müller, H Hagen
2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-4, 2016
62016
Developing a framework to improve information assurance battlespace knowledge
A Bryant, M Grimaila
Proceedings of the 2nd International Conference on Information Warfare …, 2007
62007
Developing a framework for evaluating organizational information assurance metrics programs
AR Bryant
Air Force Institute of Technology, Wright-Patterson AFB OH, Graduate School …, 2007
62007
Factors in building transparent, usable and comprehensive user privacy policy system
SK Nagaraj, A Bryant
11th International Conference on Cyber Warfare and Security: ICCWS2016 …, 2016
42016
Toward detecting novel software attacks by using constructs from human cognition
A Bryant
Proceedings of the 3rd International Conference on Information Warfare and …, 2008
42008
Connection Cartographer: Geographically Representing Host-Based Network Connections in Real-Time with a Focus on Usability
ML Duncan, AR Bryant
2016 International Conference on Collaboration Technologies and Systems (CTS …, 2016
32016
Top‐Level Goals in Reverse Engineering Executable Software
AR Bryant, R Mills, M Grimaila, GL Peterson
Journal of Information Warfare 12 (1), 32-43, 2013
32013
Eliciting a sensemaking process from verbal protocols of reverse engineers
AR Bryant, RF Mills, GL Peterson, MR Grimaila
Proceedings of the 34th Annual Meeting of the Cognitive Science Society …, 2012
32012
Visual displays for cyber network defense
CEL Sushereba, KB Bennett, A Bryant
Ergonomics 63 (2), 191-209, 2020
22020
Modeling information flow for an autonomous agent to support reverse engineering work
ZD Sisco, PP Dudenhofer, AR Bryant
The Journal of Defense Modeling and Simulation 14 (3), 245-256, 2017
22017
Detecting and mitigating rootkits in embedded systems
J Porter, A Bryant
Proceedings of the 12th International Conference on Cyber Warfare and …, 2017
22017
Establishing a Cognitive Understanding of Cyber Reverse Engineering Tasks
P Dudenhofer, A Bryant
ICMLG 2017 5th International Conference on Management Leadership and …, 2017
12017
The role of expert systems in reverse code engineering
A Smith, R Mills, A Bryant, M Grimaila, G Peterson
Proceedings of the 9th International Conference on Cyber Warfare & Security …, 2014
12014
Reverse Engineering RISC-V Generator-Based Designs for Trust and Assurance
J Durrum, A Bryant, J Porter, AFRL/RYDT Wright Patterson AFB
2019
The system can't perform the operation now. Try again later.
Articles 1–20