Mark W. Patton
According to our database1,
Mark W. Patton
authored at least 22 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Introduction to the Minitrack on Cybersecurity in the Age of Artificial Intelligence, AI for Cybersecurity, and Cybersecurity for AI.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
2020
Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
2019
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019
2018
Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach.
IEEE Intell. Syst., 2018
Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
2017
Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Large scale port scanning through tor using parallel Nmap scans to scan large portions of the IPv4 range.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
2016
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
2014
Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT).
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014
2011
J. Manag. Inf. Syst., 2011