Frederick T. Sheldon
Orcid: 0000-0003-1241-2750
According to our database1,
Frederick T. Sheldon
authored at least 122 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Trustworthy High-Performance Multiplayer Games with Trust-but-Verify Protocol Sensor Validation.
Sensors, July, 2024
Novel Ransomware Detection Exploiting Uncertainty and Calibration Quality Measures Using Deep Learning.
Inf., May, 2024
An Incremental Mutual Information-Selection Technique for Early Ransomware Detection.
Inf., April, 2024
Future Internet, April, 2024
eMIFS: A Normalized Hyperbolic Ransomware Deterrence Model Yielding Greater Accuracy and Overall Performance.
Sensors, March, 2024
Ensembling Supervised and Unsupervised Machine Learning Algorithms for Detecting Distributed Denial of Service Attacks.
Algorithms, March, 2024
Trusting Classifiers with Interpretable Machine Learning Based Feature Selection Backpropagation.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024
2023
Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems.
Future Internet, April, 2023
Mach. Learn. Knowl. Extr., March, 2023
Temporal Data Correlation Providing Enhanced Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation.
Sensors, 2023
An Enhanced Minimax Loss Function Technique in Generative Adversarial Network for Ransomware Behavior Prediction.
Future Internet, 2023
2022
Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection.
IEEE Trans. Netw. Serv. Manag., December, 2022
Sensors, 2022
Adaptive IDS for Cooperative Intelligent Transportation Systems Using Deep Belief Networks.
Algorithms, 2022
A Formal Model and Verification for HESTIA: An Automated, Adversary-Aware Risk Assessment Process for Cyber Infrastructure.
IEEE Access, 2022
Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), 2022
2021
Examining the Performance of Fog-Aided, Cloud-Centered IoT in a Real-World Environment.
Sensors, 2021
Sensors, 2021
Validation of VANET message dissemination algorithms otherwise vulnerable to broadcast storms in urban contexts.
Trans. Emerg. Telecommun. Technol., 2021
Key Factors Influencing the Rise of Current Ransomware Attacks on Industrial Control Systems.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021
An Adaptive Deep-Ensemble Anomaly-Based Intrusion Detection System for the Internet of Things.
Proceedings of the IEEE World AI IoT Congress, 2021
2020
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning.
Comput. Secur., 2020
Voice Feature Learning using Convolutional Neural Networks Designed to Avoid Replay Attacks.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
Network Intrusion Detection using Natural Language Processing and Ensemble Machine Learning.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
Elliptic Envelope Based Detection of Stealthy False Data Injection Attacks in Smart Grid Control Systems.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
Proceedings of the 3rd International Conference on Signal Processing and Information Security, 2020
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020
A proposed Crypto-Ransomware Early Detection(CRED) Model using an Integrated Deep Learning and Vector Space Model Approach.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020
2019
Microgrid Disaster Resiliency Analysis: Reducing Costs in Continuity of Operations (COOP) Planning.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
2018
METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
Authoring Adaptive Digital Computational Thinking Lessons Using vTutor for Web-Based Learning.
Proceedings of the Advances in Web-Based Learning - ICWL 2018, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
2017
J. Netw. Comput. Appl., 2017
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
2016
Int. J. Crit. Infrastructures, 2016
Using a knowledge-based security orchestration tool to reduce the risk of browser compromise.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
HERMES: A high-level policy language for high-granularity enterprise-wide secure browser configuration management.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
Proceedings of the IEEE World Congress on Services, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
Risk Assessment For Industrial Control Systems Quantifying Availability Using Mean Failure Cost (MFC).
J. Artif. Intell. Soft Comput. Res., 2015
Security Analysis of Smart Grid Cyber Physical Infrastructures Using Game Theoretic Simulation.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015
Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015
2014
Security Analysis of Selected AMI Failure Scenarios Using Agent Based Game Theoretic Simulation.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
Proceedings of the Cyber and Information Security Research Conference, 2014
Improving Cyber Resiliency of Cloud Application Services by Applying Software Behavior Encryption (SBE).
Proceedings of the Conference on Systems Engineering Research, 2014
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014
2013
Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment.
Proceedings of the ISSE 2013, 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
Proceedings of the Cyber Security and Information Intelligence, 2013
Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructure.
Proceedings of the Cyber Security and Information Intelligence, 2013
Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA).
Proceedings of the Cyber Security and Information Intelligence, 2013
2012
Inf. Syst. E Bus. Manag., 2012
Inf. Syst. E Bus. Manag., 2012
2011
IEEE Secur. Priv., 2011
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
Has the cyber warfare threat been overstated?: a cheap talk game-theoretic analysis on the Google-hacking claim?
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
Secure cryptographic key management system (CKMS) considerations for smart grid devices.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011
2010
Innov. Syst. Softw. Eng., 2010
A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance - Applying Cyber Security Econometrics System (CSES) to Mission Assurance Analysis Protocol (MAAP).
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
2009
Int. J. Netw. Secur., 2009
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Challenging the Mean Time to Failure: Measuring Dependability as a Mean Failure Cost.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
An outline of the three-layer survivability analysis architecture for strategic information warfare research.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009
2008
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008
Evaluating security controls based on key performance indicators and stakeholder mission.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008
2007
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007
2006
J. Softw. Maintenance Res. Pract., 2006
Innov. Syst. Softw. Eng., 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006
2005
Innov. Syst. Softw. Eng., 2005
Position Statement: Methodology to Support Dependable Survivable Cyber-Secure Infrastructures.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
2004
Testing Software Requirements with Z and Statecharts Applied to an Embedded Control System.
Softw. Qual. J., 2004
Multi-Agent System Case Studies in Command and Control, Information Fusion and Datat Managment.
Informatica (Slovenia), 2004
Assessing the effect of failure severity, coincident failures and usage-profiles on the reliability of embedded control systems.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Proceedings of the 8th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2004), 2004
2003
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003
Assessment of High Integrity Software Components for Completeness, Consistency, Fault-Tolerance, and Reliability.
Proceedings of the Component-Based Software Quality - Methods and Techniques, 2003
Suitability of Agent-Based Systems for Command and Control in Fault-Tolerant, Safety-Critical Responsive Decision Networks.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003
2002
J. Softw. Maintenance Res. Pract., 2002
Case Study: B2B E-Commerce System Specification and Implementation Employing Use-Case Diagrams, Digital Signatures and XML.
Proceedings of the 4th International Symposium on Multimedia Software Engineering, 2002
Examining Coincident Failures and Usage Profiles in Reliability Analysis of an Embedded Vehicle Sub-System.
Proceedings of the 16<sup>th</sup> European Simulation Multiconference: Modelling and Simulation 2002, 2002
Case Study: Implementing a Web Based Auction System Using UML and Component-Based Programming.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002
2001
A Case Study: Validation of Guidance Control Software Requirements for Completeness, Consistency and Fault Tolerance.
Proceedings of the 8th Pacific Rim International Symposium on Dependable Computing (PRDC 2001), 2001
2000
Proceedings of the 10th International Workshop on Software Specification and Design, 2000
1999
Composing, analyzing and validating software models to assess the performability of competing design candidates.
Ann. Softw. Eng., 1999
Tool-Based Approach to Distributed Database Design: Includes Web-Based Forms Design for Access to Academic Affairs Data.
Proceedings of the 1999 ACM Symposium on Applied Computing, 1999
1998
Analysis of Real-Time Concurrent System Models based on CSP Using Stochastic Petri Nets.
Proceedings of the 12<sup>th</sup> European Simulation Multiconference - Simulation, 1998
1996
Int. J. Softw. Eng. Knowl. Eng., 1996
1995
Proceedings of the 28th Annual Hawaii International Conference on System Sciences (HICSS-28), 1995
1994
Proceedings of the Proceedings 1994 International Conference on Parallel and Distributed Systems, 1994
1993
Proceedings of the Fourth International Symposium on Software Reliability Engineering, 1993
1992
Proceedings of the Real Time Computing, 1992