Filter
Conference contribution

Search results

  • 2023

    AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors

    Bridges, R. A., Weber, B., Beaver, J. M., Smith, J. M., Verma, M. E., Norem, S., Spakes, K., Watson, C., Nichols, J. A., Jewell, B., Iannacone, M. D., Stahl, C. D., Huffer, K. M. T. & Oesch, T. S., 2023, Proceedings - 2023 IEEE International Conference on Big Data, BigData 2023. He, J., Palpanas, T., Hu, X., Cuzzocrea, A., Dou, D., Slezak, D., Wang, W., Gruca, A., Lin, J.C.-W. & Agrawal, R. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1620-1629 10 p. (Proceedings - 2023 IEEE International Conference on Big Data, BigData 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A Privacy-Aware Federated Learning Framework for Distributed Energy Resource Analytics in Constrained Environments

    Sundararajan, A., Bridges, R. A., Olama, M. & Ferrari, M., 2023, 2023 IEEE PES Innovative Smart Grid Technologies Latin America, ISGT-LA 2023. Institute of Electrical and Electronics Engineers Inc., p. 155-159 5 p. (2023 IEEE PES Innovative Smart Grid Technologies Latin America, ISGT-LA 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2022

    A Mathematical Framework for Evaluation of SOAR Tools with Limited Survey Data

    Norem, S., Rice, A. E., Erwin, S., Bridges, R. A., Oesch, S. & Weber, B., 2022, Computer Security. ESORICS 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT and SECOMANE, 2021. Katsikas, S., Lambrinoudakis, C., Cuppens, N., Mylopoulos, J., Kalloniatis, C., Meng, W., Furnell, S., Pallas, F., Pohle, J., Sasse, M. A., Abie, H., Ranise, S., Verderame, L., Cambiaso, E., Maestre Vidal, J. & Sotelo Monge, M. A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 557-575 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13106 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    2 Scopus citations
  • Secure Collaborative Environment for Seamless Sharing of Scientific Knowledge

    Yoginath, S., Doucet, M., Bhowmik, D., Heise, D., Alamudun, F., Yoon, H. J. & Stanley, C., 2022, Driving Scientific and Engineering Discoveries Through the Integration of Experiment, Big Data, and Modeling and Simulation - 21st Smoky Mountains Computational Sciences and Engineering, SMC 2021, Revised Selected Papers. Nichols, [.-N., Maccabe, [.-N. ‘., Nutaro, J., Pophale, S., Devineni, P., Ahearn, T. & Verastegui, B. (eds.). Springer Science and Business Media Deutschland GmbH, p. 139-156 18 p. (Communications in Computer and Information Science; vol. 1512 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2021

    D2U: Data Driven User Emulation for the Enhancement of Cyber Testing, Training, and Data Set Generation

    Oesch, S., Bridges, R. A., Verma, M., Weber, B. & Diallo, O., Aug 9 2021, Proceedings of CSET 2021 - 14th Workshop on Cyber Security Experimentation and Test. Association for Computing Machinery, p. 17-26 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    2 Scopus citations
  • 2020

    An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center

    Oesch, S., Bridges, R., Smith, J., Beaver, J., Goodall, J., Huffer, K., Miles, C. & Scofield, D., Nov 2020, Proceedings - IEEE Congress on Cybermatics: 2020 IEEE International Conferences on Internet of Things, iThings 2020, IEEE Green Computing and Communications, GreenCom 2020, IEEE Cyber, Physical and Social Computing, CPSCom 2020 and IEEE Smart Data, SmartData 2020. Institute of Electrical and Electronics Engineers Inc., p. 634-641 8 p. 9291520. (Proceedings - IEEE Congress on Cybermatics: 2020 IEEE International Conferences on Internet of Things, iThings 2020, IEEE Green Computing and Communications, GreenCom 2020, IEEE Cyber, Physical and Social Computing, CPSCom 2020 and IEEE Smart Data, SmartData 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    5 Scopus citations
  • 2019

    Active manifolds: A non-linear analogue to Active Subspaces

    Bridges, R. A., Gruber, A. D., Felder, C. R., Verma, M. E. & Hoff, C., 2019, 36th International Conference on Machine Learning, ICML 2019. International Machine Learning Society (IMLS), p. 1204-1212 9 p. (36th International Conference on Machine Learning, ICML 2019; vol. 2019-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection

    Chen, Q., Islam, S. R., Haswell, H. & Bridges, R. A., 2019, Science of Cyber Security - 2nd International Conference, SciSec 2019, Revised Selected Papers. Liu, F., Xu, J., Xu, S. & Yung, M. (eds.). Springer, p. 199-214 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11933 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    26 Scopus citations
  • Towards a CAN IDS Based on a Neural Network Data Field Predictor

    Pawelec, K., Bridges, R. A. & Combs, F. L., Mar 13 2019, AutoSec 2019 - Proceedings of the ACM Workshop on Automotive Cybersecurity, co-located with CODASPY 2019. Association for Computing Machinery, Inc, p. 31-34 4 p. (AutoSec 2019 - Proceedings of the ACM Workshop on Automotive Cybersecurity, co-located with CODASPY 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    20 Scopus citations
  • 2018

    ACTT: Automotive CAN tokenization and translation

    Verma, M., Bridges, R. & Hollifield, S., Dec 2018, Proceedings - 2018 International Conference on Computational Science and Computational Intelligence, CSCI 2018. Institute of Electrical and Electronics Engineers Inc., p. 278-283 6 p. 8947694. (Proceedings - 2018 International Conference on Computational Science and Computational Intelligence, CSCI 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    20 Scopus citations
  • Defining a Metric Space of Host Logs and Operational Use Cases

    Verma, M. E. & Bridges, R. A., Jul 2 2018, Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018. Abe, N., Liu, H., Pu, C., Hu, X., Ahmed, N., Qiao, M., Song, Y., Kossmann, D., Liu, B., Lee, K., Tang, J., He, J. & Saltz, J. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 5068-5077 10 p. 8622083. (Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    8 Scopus citations
  • EGBTER: Capturing degree distribution, clustering coefficients, and community structure in a single random graph model

    El-Daghar, O., Lundberg, E. & Bridges, R., Oct 24 2018, Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018. Tagarelli, A., Reddy, C. & Brandes, U. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 282-289 8 p. 8508598. (Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    2 Scopus citations
  • Exploiting the Shape of CAN Data for In-Vehicle Intrusion Detection

    Tyree, Z., Bridges, R. A., Combs, F. L. & Moore, M. R., Jul 2 2018, 2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8690644. (IEEE Vehicular Technology Conference; vol. 2018-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    16 Scopus citations
  • Improvement of the Harris corner detector using an entropy-block-based strategy

    Sun, Y., Ientilucci, E. & Voisin, S., 2018, Algorithms and Technologies for Multispectral, Hyperspectral, and Ultraspectral Imagery XXIV. Messinger, D. W. & Velez-Reyes, M. (eds.). SPIE, 1064414. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 10644).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics

    Bridges, R., Hernandez Jimenez, J., Nichols, J., Goseva-Popstojanova, K. & Prowell, S., Sep 5 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers Inc., p. 1680-1684 5 p. 8456118. (Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    25 Scopus citations
  • 2017

    Automated behavioral analysis of malware: A case study of wannacry ransomware

    Chen, Q. & Bridges, R. A., 2017, Proceedings - 16th IEEE International Conference on Machine Learning and Applications, ICMLA 2017. Chen, X., Luo, B., Luo, F., Palade, V. & Wani, M. A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 454-460 7 p. (Proceedings - 16th IEEE International Conference on Machine Learning and Applications, ICMLA 2017; vol. 2017-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    152 Scopus citations
  • Cybersecurity automated information extraction techniques: Drawbacks of current methods, and enhanced extractors

    Bridges, R. A., Huffer, K. M. T., Jones, C. L., Iannacone, M. D. & Goodall, J. R., 2017, Proceedings - 16th IEEE International Conference on Machine Learning and Applications, ICMLA 2017. Chen, X., Luo, B., Luo, F., Palade, V. & Wani, M. A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 437-442 6 p. (Proceedings - 16th IEEE International Conference on Machine Learning and Applications, ICMLA 2017; vol. 2017-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    20 Scopus citations
  • Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: A data-driven approach to in-vehicle intrusion detection

    Moore, M. R., Bridges, R. A., Combs, F. L., Starr, M. S. & Prowell, S. J., Apr 4 2017, Proceedings of the 12th Annual Cyber and Information Security Research Conference, CISRC 2017. Association for Computing Machinery, a11. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    88 Scopus citations
  • Setting the threshold for high throughput detectors: A mathematical approach for ensembles of dynamic, heterogeneous, probabilistic anomaly detectors

    Bridges, R. A., Jamieson, J. D. & Reed, J. W., Jul 1 2017, Proceedings - 2017 IEEE International Conference on Big Data, Big Data 2017. Nie, J.-Y., Obradovic, Z., Suzumura, T., Ghosh, R., Nambiar, R., Wang, C., Zang, H., Baeza-Yates, R., Baeza-Yates, R., Hu, X., Kepner, J., Cuzzocrea, A., Tang, J. & Toyoda, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1071-1078 8 p. (Proceedings - 2017 IEEE International Conference on Big Data, Big Data 2017; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    7 Scopus citations
  • 2016

    GraphPrints: Towards a graph analytic method for network anomaly detection

    Harshaw, C. R., Bridges, R. A., Iannacone, M. D., Reed, J. W. & Goodall, J. R., Apr 5 2016, Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016. Association for Computing Machinery, Inc, 2897806. (Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    25 Scopus citations
  • Towards reducing the data exfiltration surface for the insider threat

    Schlicher, B. G., MacIntyre, L. P. & Abercrombie, R. K., Mar 7 2016, Proceedings of the 49th Annual Hawaii International Conference on System Sciences, HICSS 2016. Sprague, R. H. & Bui, T. X. (eds.). IEEE Computer Society, p. 2749-2758 10 p. 7427528. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 2016-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    7 Scopus citations
  • 2015

    Developing an ontology for cyber security knowledge graphs

    Iannacone, M., Bohn, S., Nakamura, G., Gerth, J., Huffer, K., Bridges, R., Ferragut, E. & Goodall, J., Apr 7 2015, Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISRC 2015. Association for Computing Machinery, 12. (ACM International Conference Proceeding Series; vol. 06-08-April-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    99 Scopus citations
  • Multi-level anomaly detection on time-varying graph data

    Bridges, R. A., Collins, J. P., Ferragut, E. M., Laska, J. A. & Sullivan, B. D., Aug 25 2015, Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015. Pei, J., Tang, J. & Silvestri, F. (eds.). Association for Computing Machinery, Inc, p. 579-583 5 p. (Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    17 Scopus citations
  • Towards a relation extraction framework for cyber-security concepts

    Jones, C. L., Bridges, R. A., Huffer, K. M. T. & Goodall, J. R., Apr 7 2015, Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISRC 2015. Association for Computing Machinery, 11. (ACM International Conference Proceeding Series; vol. 06-08-April-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    63 Scopus citations
  • 2014

    Integration of external data sources with cyber security data warehouse

    Czejdo, B. D., Iannacone, M. D., Bridges, R. A., Ferragut, E. M. & Goodall, J. R., 2014, Proceedings of 2014 9th Annual Cyber and Information Security Research Conference, CISRC 2014. Association for Computing Machinery, p. 49-52 4 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2013

    Automated assessment of bilateral breast volume asymmetry as a breast cancer biomarker during mammographic screening

    Williams, A. C., Hitt, A., Voisin, S. & Tourassi, G., 2013, Medical Imaging 2013: Computer-Aided Diagnosis. 86701A. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 8670).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Investigating the association of eye gaze pattern and diagnostic error in mammography

    Voisin, S., Pinto, F., Xu, S., Morin-Ducote, G., Hudson, K. & Tourassi, G. D., 2013, Medical Imaging 2013: Image Perception, Observer Performance, and Technology Assessment. 867302. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 8673).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • Personalized modeling of human gaze: Exploratory investigation on mammogram readings

    Voisin, S., Yoon, H. J., Tourassi, G., Morin-Ducote, G. & Hudson, K., 2013, Proceedings of the 2013 4th Annual ORNL Biomedical Sciences and Engineering Conference: Collaborative Biomedical Innovations, BSEC 2013. 6618495. (Proceedings of the 2013 4th Annual ORNL Biomedical Sciences and Engineering Conference: Collaborative Biomedical Innovations, BSEC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2012

    Advanced metering infrastructure and communication test bed and applications for grid reliability

    Snyder, I., Paul, N. & Macintyre, L., 2012, FIIW 2012 - 2012 Future of Instrumentation International Workshop Proceedings. p. 70-73 4 p. 6378347. (FIIW 2012 - 2012 Future of Instrumentation International Workshop Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A new, principled approach to anomaly detection

    Ferragut, E. M., Laska, J. & Bridges, R. A., 2012, Proceedings - 2012 11th International Conference on Machine Learning and Applications, ICMLA 2012. p. 210-215 6 p. 6406752. (Proceedings - 2012 11th International Conference on Machine Learning and Applications, ICMLA 2012; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations