Rayford B. Vaughn
According to our database1,
Rayford B. Vaughn
authored at least 54 papers
between 1993 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2016
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity Simulation.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016
2015
Introduction to the E-government Secure Cyberspace in 21st Century Government Minitrack.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
2014
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
2013
Proceedings of the Information Assurance and Security Education and Training, 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
Development & expansion of an industrial control system security laboratory and an international research collaboration.
Proceedings of the Cyber Security and Information Intelligence, 2013
Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security.
Proceedings of the Eleventh Australasian Information Security Conference, 2013
2012
A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control Systems.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
2010
Telecommun. Syst., 2010
Structured Forensics Examination Planning with Domain Modeling: A Report of Three Experiment Trials.
J. Digit. Forensic Pract., 2010
2009
J. Syst. Softw., 2009
Outreach, Teaching and Research Facilitated by a Forensics Training Center in Direct Support of Public Safety and Criminal Justice.
Int. J. Comput. Their Appl., 2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
2008
A Comparison of Forensic Hard Drive Imagers: A Time Analysis Comparison Between the ICS Image MASSter-Solo III and the Logicube Talon.
J. Digit. Forensic Pract., 2008
Proceedings of the Advances in Digital Forensics IV, 2008
2007
J. Syst. Softw., 2007
Proceedings of the Advances in Digital Forensics III, 2007
The Development of a University-Based Forensics Training Center as a Regional Outreach and Service Activity.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Sensor Corroboration for Anomaly Sensors in an Intrusion Detection Environment.
Proceedings of the ISCA 20th International Conference on Computer Applications in Industry and Engineering, 2007
Efficient Update on Exploitation Graphs for Vulnerability Analysis.
Proceedings of the ISCA 20th International Conference on Computer Applications in Industry and Engineering, 2007
2006
Honey Tokens and Web Bugs: Developing Reactive Techniques for Investigating Phishing Scams.
J. Digit. Forensic Pract., 2006
Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
Keeping An Educational Network Healthy: Differentiating Malicious And Naive Students On An Educational Network Environment.
Proceedings of the 2006 International Conference on Security & Management, 2006
Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006
2005
Software requirement understanding using Pathfinder networks: discovering and evaluating mental models.
J. Syst. Softw., 2005
Concurr. Comput. Pract. Exp., 2005
Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005
Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models.
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Intelligence and Security Informatics, 2005
2004
J. Digit. Inf. Manag., 2004
Decision Making For Network Health Assessment In An Intelligent Intrusion Detection System Architecture.
Int. J. Inf. Technol. Decis. Mak., 2004
Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
2003
Advances in the provisions of system and software security - Thirty years of progress.
Adv. Comput., 2003
Proceedings of the IEEE International Conference on Systems, 2003
Panel: Teaching Undergraduate Information Assurance.
Proceedings of the Security Education and Critical Infrastructures, 2003
Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003
Classification of anomalous traces of privileged and parallel programs by neural networks.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003
2002
J. Syst. Softw., 2002
Proceedings of the 15th Conference on Software Engineering Education and Training (CSEET'02), 2002
2001
Comput. Sci. Educ., 2001
2000
Proceedings of the 31st SIGCSE Technical Symposium on Computer Science Education, 2000
A Report on Industrial Transfer of Software Engineering to the Classroom Environment.
Proceedings of the Thirteenth Conference on Software Engineering Education and Training, 2000
1999
Integration of computer security into the software engineering and computer science programs.
J. Syst. Softw., 1999
Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum).
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
1994
A Proposed Mechanism for Implementation of Non-Discretionary Access Controls in a Network Environment.
Comput. Networks ISDN Syst., 1994
1993
A survey of security issues in office computation and the application of secure computing models to office systems.
Comput. Secur., 1993