Utilizing Threat Partitioning for More Practical Network Anomaly Detection.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Enhancing User Behavior Modeling via Machine Learning with Combined Text and Image Data.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Improving virtual pipes model of hydraulic and thermal erosion with vegetation considerations.
Vis. Comput., July, 2023
DDoS-as-a-Smokescreen: Leveraging Netflow Concurrency and Segmentation for Faster Detection.
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Generation of crowd arrival and destination locations/times in complex transit facilities.
Vis. Comput., 2020
A Semi-Automated Technique for Transcribing Accurate Crowd Motions.
Int. J. Image Graph., 2020
Mimicking Human Behavior in Shared-Resource Computer Networks.
Proceedings of the 20th IEEE International Conference on Information Reuse and Integration for Data Science, 2019
Lifting the Smokescreen: Detecting Underlying Anomalies During a DDoS Attack.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
The Hidden Crisis : Developing Smart Big Data pipelines to address Grand Challenges of Bridge Infrastructure health in the United States.
Proceedings of the 15th International Conference on Information Systems for Crisis Response and Management, 2018
Large-Scale Realistic Network Data Generation on a Budget.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018
A Framework for Achieving Realism in Agent-Based Pedestrian Crowd Simulations.
Proceedings of the 23rd Americas Conference on Information Systems, 2017
Isolation of Multiple Anonymous Attackers in Mobile Networks.
Proceedings of the Network and System Security - 9th International Conference, 2015
Diagnosis for uncertain, dynamic and hybrid domains using Bayesian networks and arithmetic circuits.
Int. J. Approx. Reason., 2014