Bob G. Schlicher

According to our database1, Bob G. Schlicher authored at least 10 papers between 2008 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Towards Reducing the Data Exfiltration Surface for the Insider Threat.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
An interactive ontology-driven information system for simulating background radiation and generating scenarios for testing special nuclear materials detection algorithms.
Eng. Appl. Artif. Intell., 2015

A Computing Environment to Support Repeatable Scientific Big Data Experimentation of World-Wide Scientific Literature.
Proceedings of the 15th International Conference on Scientometrics and Informetrics, Istanbul, Turkey, June 29, 2015

Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

2014
Security Analysis of Selected AMI Failure Scenarios Using Agent Based Game Theoretic Simulation.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Conceptual framework to enable early warning of relevant phenomena "Emerging phenomena and big data".
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

2012
A study of scientometric methods to identify emerging technologies via modeling of milestones.
Scientometrics, 2012

2011
Ontology-based software for generating scenarios for characterizing search for nuclear materials.
Proceedings of the Sixth International Conference on Semantic Technologies for Intelligence, 2011

Secure VM for monitoring industrial process controllers.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2008
Emergence of cyber anti-forensics impacting cyber security.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008


  Loading...