Peter J. Hawrylak

Orcid: 0000-0003-3268-7452

According to our database1, Peter J. Hawrylak authored at least 35 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
State Space Explosion Mitigation for Large-Scale Attack and Compliance Graphs Using Synchronous Exploit Firing.
IEEE Open J. Comput. Soc., 2023

2022
Strategies for Practical Hybrid Attack Graph Generation and Analysis.
DTRAP, 2022

2020
Implementing an Attack Graph Generator in CUDA.
Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium Workshops, 2020

2019
Combining OpenCL and MPI to Support Heterogeneous Computing on a Cluster.
Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning), 2019

Practical Cyber-Security Solutions for the Science DMZ.
Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning), 2019

Automatic Identification of Critical Digital Assets.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Concurrency Strategies for Attack Graph Generation.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Platform-Agnostic Language to Map Control Primitives to SCADA Communication Protocols.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Using Bro with a Simulation Model to Detect Cyber-Physical Attacks in a Nuclear Reactor.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

2018
Competitive Learning Environment for Cyber-Physical System Security Experimentation.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Automatic Generation of Attack Scripts from Attack Graphs.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

2017
Undergraduate Educational Pathways for Developing a High-Performance Computing Workforce.
Proceedings of the Practice and Experience in Advanced Research Computing 2017: Sustainability, 2017

Introducing priority into hybrid attack graphs.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

Simulation and analysis framework for cyber-physical systems.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

2016
Network Modeling for Security Analytics.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

Scalable Attack Graph Generation.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2015
HydroSense: A self-powered wireless device for monitoring water usage in hotel showers.
Proceedings of the 2015 IEEE Global Humanitarian Technology Conference, 2015

Data Privacy Issues with RFID in Healthcare.
Proceedings of the Medical Data Privacy Handbook, 2015

2014
Modeling and simulation of electric power substation employing an IEC 61850 network.
Proceedings of the Cyber and Information Security Research Conference, 2014

Hybrid extensions for stateful attack graphs.
Proceedings of the Cyber and Information Security Research Conference, 2014

2013
Interoperability Verification in ISO 18000-7 Active RFID Systems: Experimental Setup and Results.
Wirel. Pers. Commun., 2013

Estimating link availability and timing delays in ethernet-based networks.
Proceedings of the Cyber Security and Information Intelligence, 2013

Implementing graceful RFID privilege reduction.
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
Interoperability Test Methodology for ISO 18000-7 Active RFID.
Wirel. Pers. Commun., 2012

Security Risks Associated with Radio Frequency Identification in Medical Environments.
J. Medical Syst., 2012

Using Radio Frequency Identification (RFID) Tags to Store Medical Information Needed by First Responders: Data Format, Privacy, and Security.
Int. J. Comput. Model. Algorithms Medicine, 2012

2011
A Passive Radio Frequency Amplifier for Radio Frequency Identification Tags.
J. Low Power Electron., 2011

Anti-collision policy for RFID systems: fast predict tags in field algorithm.
Int. J. Radio Freq. Identif. Technol. Appl., 2011

A novel software-radio-defined passive RFID reading system with real-time collision resolution.
Int. J. Ad Hoc Ubiquitous Comput., 2011

Toward hybrid attack dependency graphs.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Graceful privilege reduction in RFID security.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2009
Analysis Methods for Sensor Networks.
Proceedings of the Guide to Wireless Sensor Networks, 2009

2008
Radio frequency identification prototyping.
ACM Trans. Design Autom. Electr. Syst., 2008

2007
Analytic modelling methodology for analysis of energy consumption for ISO 18000-7 RFID networks.
Int. J. Radio Freq. Identif. Technol. Appl., 2007

2006
Passive active radio frequency identification tags.
Int. J. Radio Freq. Identif. Technol. Appl., 2006


  Loading...