Volgen
Adam Slagell
Adam Slagell
ESnet Energy Sciences Network
Geverifieerd e-mailadres voor es.net - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Adapting bro into scada: building a specification-based intrusion detection system for the dnp3 protocol
H Lin, A Slagell, C Di Martino, Z Kalbarczyk, RK Iyer
Proceedings of the Eighth Annual Cyber Security and Information Intelligence …, 2013
1482013
Runtime semantic security analysis to detect and mitigate control-related attacks in power grids
H Lin, A Slagell, ZT Kalbarczyk, PW Sauer, RK Iyer
IEEE Transactions on Smart Grid 9 (1), 163-178, 2016
1122016
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs.
AJ Slagell, K Lakkaraju, K Luo
LISA 6, 3-8, 2006
1032006
Sharing computer network logs for security and privacy: A motivation for new methodologies of anonymization
A Slagell, W Yurcik
Workshop of the 1st International Conference on Security and Privacy for …, 2005
852005
Semantic security analysis of SCADA networks to detect malicious control commands in power grids
H Lin, A Slagell, Z Kalbarczyk, PW Sauer, RK Iyer
Proceedings of the first ACM workshop on Smart energy grid security, 29-34, 2013
642013
The design of VisFlowConnect-IP: a link analysis system for IP security situational awareness
X Yin, W Yurcik, A Slagell
Third IEEE International Workshop on Information Assurance (IWIA'05), 141-153, 2005
632005
Closing-the-loop in nvisionip: Integrating discovery and search in security visualizations
K Lakkaraju, R Bearavolu, A Slagell, W Yurcik, S North
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 75-82, 2005
562005
A survey of PKI components and scalability issues
A Slagell, R Bonilla, W Yurcik
2006 IEEE International Performance Computing and Communications Conference …, 2006
532006
Credential Wallets: A Classification of Credential Repositories Highlighting MyProxy
WJ Yurcik, RF Bonilla, A Stagell, J Basney
TPRC, 2003
522003
A taxonomy and adversarial model for attacks against network log anonymization
J King, K Lakkaraju, A Slagell
Proceedings of the 2009 ACM symposium on Applied Computing, 1286-1293, 2009
512009
Evaluating the utility of anonymized network traces for intrusion detection
K Lakkaraju, A Slagell
Proceedings of the 4th international conference on Security and privacy in …, 2008
452008
Preemptive intrusion detection: Theoretical framework and real-world measurements
P Cao, E Badger, Z Kalbarczyk, R Iyer, A Slagell
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-12, 2015
442015
Sels: a secure e-mail list service
H Khurana, A Slagell, R Bonilla
Proceedings of the 2005 ACM symposium on Applied computing, 306-313, 2005
392005
Network log anonymization: Application of crypto-pan to cisco netflows
A Slagell, J Wang, W Yurcik
Proceedings of the Workshop on Secure Knowledge Management 2004, 2004
372004
Sharing network logs for computer forensics: A new tool for the anonymization of netflow records
AJ Slagell, Y Li, K Luo
Workshop of the 1st International Conference on Security and Privacy for …, 2005
342005
The bro network security monitor
V Paxson, R Sommer, S Hall, C Kreibich, J Barlow, G Clark, G Maier, ...
Bro. org.[Online]. Available: https://www. bro. org/.[Accessed: 10-Mar-2017], 2012
322012
Canine: A combined conversion and anonymization tool for processing netflows for security
Y Li, A Slagell, K Luo, W Yurcik
International conference on telecommunication systems modeling and analysis 21, 2005
232005
Canine: A combined conversion and anonymization tool for processing netflows for security
Y Li, A Slagell, K Luo, W Yurcik
International conference on telecommunication systems modeling and analysis 21, 2005
232005
Known-plain text attack against a permutation based video encryption algorithm
AJ Slagell
Security, 1-10, 2004
232004
Collaborative Computer Security and Trust Management
JM Seigneur, A Slagell
IGI Global, 2009
172009
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20