John Hale

Orcid: 0000-0002-5956-8093

According to our database1, John Hale authored at least 84 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Evaluation of Croatian ASR Models for Čakavian Transcription.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024

2023
Transformation vs Tradition: Artificial General Intelligence (AGI) for Arts and Humanities.
CoRR, 2023

2022
Strategies for Practical Hybrid Attack Graph Generation and Analysis.
DTRAP, 2022

Quantifying Discourse Support for Omitted Pronouns.
CoRR, 2022

2020
Implementing an Attack Graph Generator in CUDA.
Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium Workshops, 2020

2019
Combining OpenCL and MPI to Support Heterogeneous Computing on a Cluster.
Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning), 2019

Practical Cyber-Security Solutions for the Science DMZ.
Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning), 2019

Automatic Identification of Critical Digital Assets.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Concurrency Strategies for Attack Graph Generation.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Platform-Agnostic Language to Map Control Primitives to SCADA Communication Protocols.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Using Bro with a Simulation Model to Detect Cyber-Physical Attacks in a Nuclear Reactor.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

2018
A Platform for Experimentation with and Measurement of Reflective Deception.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Competitive Learning Environment for Cyber-Physical System Security Experimentation.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Automatic Generation of Attack Scripts from Attack Graphs.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Processing MWEs: Neurocognitive Bases of Verbal MWEs and Lexical Cohesiveness within MWEs.
Proceedings of the Joint Workshop on Linguistic Annotation, 2018

LSTMs Can Learn Syntax-Sensitive Dependencies Well, But Modeling Structure Makes Them Better.
Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018

2017
Undergraduate Educational Pathways for Developing a High-Performance Computing Workforce.
Proceedings of the Practice and Experience in Advanced Research Computing 2017: Sustainability, 2017

Introducing priority into hybrid attack graphs.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

Simulation and analysis framework for cyber-physical systems.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

POSTER: Evaluating Reflective Deception as a Malware Mitigation Strategy.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Information-theoretical Complexity Metrics.
Lang. Linguistics Compass, 2016

Network Modeling for Security Analytics.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

Scalable Attack Graph Generation.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2015
Robust wireless signal indoor localization.
Concurr. Comput. Pract. Exp., 2015

Measuring the Potential for Victimization in Malicious Content.
Proceedings of the 2015 IEEE International Conference on Web Services, 2015

Privacy Considerations and Techniques for Neuroimages.
Proceedings of the Medical Data Privacy Handbook, 2015

Privacy Considerations for Health Information Exchanges.
Proceedings of the Medical Data Privacy Handbook, 2015

Data Privacy Issues with RFID in Healthcare.
Proceedings of the Medical Data Privacy Handbook, 2015

2014
Hybrid extensions for stateful attack graphs.
Proceedings of the Cyber and Information Security Research Conference, 2014

Location-based device grouping for function restriction.
Proceedings of the Cyber and Information Security Research Conference, 2014

2013
Implementing graceful RFID privilege reduction.
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
Security Risks Associated with Radio Frequency Identification in Medical Environments.
J. Medical Syst., 2012

Systematic Redaction for Neuroimage Data.
Int. J. Comput. Model. Algorithms Medicine, 2012

Development of a System Framework for Implementation of an Enhanced Role-Based Access Control Model to Support Collaborative Processes.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

Memory Resource Allocation in Top-Down Minimalist Parsing.
Proceedings of the Formal Grammar, 2012

Spatial identity awareness: Towards secure collaborative environments.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

2011
Quickshear Defacing for Neuroimages.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

Preserving Privacy in Structural Neuroimages.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Toward hybrid attack dependency graphs.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Techniques for attack graph visualization and interaction.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Graceful privilege reduction in RFID security.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Toward sensitive information redaction in a collaborative, multilevel security environment.
Proceedings of the 6th International Symposium on Wikis and Open Collaboration, 2010

On Resolving the Privacy Debate in Deidentified Neuroimages.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

The Blunderdome: An Offensive Exercise for Building Network, Systems, and Web Security Awareness.
Proceedings of the 3rd Workshop on Cyber Security Experimentation and Test, 2010

2009
Heuristic search in a cognitive model of human parsing.
Proceedings of the 11th International Workshop on Parsing Technologies (IWPT-2009), 2009

Toward Robust and Extensible Automatic Protocol Identification.
Proceedings of the 2009 International Conference on Internet Computing, 2009

Content-based alternatives to conventional network monitoring systems.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

GridSPiM: A Framework for Simple Locality and Containment in the Stochastic pi-Calculus.
Proceedings of the Bioinformatics and Computational Biology, 2009

2008
Issues and Techniques for Redacting PDF Files.
J. Digit. Forensic Pract., 2008

Strata-Gem: risk assessment through mission modeling.
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008

2007
Book Review.
J. Log. Lang. Inf., 2007

Secur(e/ity) Management: A Continuing Uphill Climb.
J. Netw. Syst. Manag., 2007

Redacting Digital Information from Electronic Devices.
Proceedings of the Advances in Digital Forensics III, 2007

2006
Uncertainty About the Rest of the Sentence.
Cogn. Sci., 2006

SParseval: Evaluation Metrics for Parsing Speech.
Proceedings of the Fifth International Conference on Language Resources and Evaluation, 2006

Reranking for Sentence Boundary Detection in Conversational Speech.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

PCFGs with Syntactic and Prosodic Indicators of Speech Repairs.
Proceedings of the ACL 2006, 2006

2005
The Shifting Sands of Security Management.
J. Netw. Syst. Manag., 2005

2004
Secur(e/ity) Management: Two Sides of the Same Coin.
J. Netw. Syst. Manag., 2004

A Systematic Approach to Multi-Stage Network Attack Analysis.
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), 2004

2003
Programmable Access Control.
J. Comput. Secur., 2003

Integrating Logics and Process Calculi for Cryptographic Protocol Analysis.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

2002
Implementation and Verification of Programmable Security.
Proceedings of the Research Directions in Data and Applications Security, 2002

On Modeling Computer Networks for Vulnerability Analysis.
Proceedings of the Research Directions in Data and Applications Security, 2002

2001
A Probabilistic Earley Parser as a Psycholinguistic Model.
Proceedings of the Language Technologies 2001: The Second Meeting of the North American Chapter of the Association for Computational Linguistics, 2001

Formal Analysis of E-Commerce Protocols.
Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems, 2001

Public Telephone Network Vulnerabilities.
Proceedings of the Database and Application Security XV, 2001

2000
A Ticket-Based Access Control Architecture for Object Systems.
J. Comput. Secur., 2000

Simulation and Analysis of Cryptographic Protocols.
Proceedings of the Data and Application Security, 2000

Language Extensions for Programmable Security.
Proceedings of the Data and Application Security, 2000

Extending Java for Package based Access Control.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

Policy Mediation for Multi-Enterprise Environments.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
Security Policy Coordination for Heterogeneous Information Systems.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Programmable Security for Object-Oriented Systems.
Proceedings of the Database Security XII: Status and Prospects, 1998

A Statistical Approach to Anaphora Resolution.
Proceedings of the Sixth Workshop on Very Large Corpora, 1998

1997
Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

Capability-Based Primitives for Access Control in Object-Oriented Systems.
Proceedings of the Database Securty XI: Status and Prospects, 1997

An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects.
Proceedings of the Database Securty XI: Status and Prospects, 1997

1996
Analyzing FD Inference in Relational Databases.
Data Knowl. Eng., 1996

A Framework for High Assurance Security of Distributed Objects.
Proceedings of the Database Security Volume X, 1996

1995
A Tool for Inference Detection and Knowledge Discovery in Databases.
Proceedings of the Database Security IX: Status and Prospects, 1995

1994
A genetic algorithm for fragment allocation in a distributed database system.
Proceedings of the 1994 ACM Symposium on Applied Computing, 1994

A Practical Formalism for Imprecise Inference Control.
Proceedings of the Database Security, 1994

Learning to Coordinate without Sharing Information.
Proceedings of the 12th National Conference on Artificial Intelligence, Seattle, WA, USA, July 31, 1994


  Loading...