Robert A. Bridges
Orcid: 0000-0001-7962-6329
According to our database1,
Robert A. Bridges
authored at least 49 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
2023
Beyond the Hype: An Evaluation of Commercially Available Machine Learning-based Malware Detectors.
DTRAP, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
2022
Assembling a Cyber Range to Evaluate Artificial Intelligence / Machine Learning (AI/ML) Security Tools.
CoRR, 2022
2021
CAN-D: A Modular Four-Step Pipeline for Comprehensively Decoding Controller Area Network Data.
IEEE Trans. Veh. Technol., 2021
What Clinical Trials Can Teach Us about the Development of More Resilient AI for Cybersecurity.
CoRR, 2021
D2U: Data Driven User Emulation for the Enhancement of Cyber Testing, Training, and Data Set Generation.
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
2020
ACM Comput. Surv., 2020
ROAD: The Real ORNL Automotive Dynamometer Controller Area Network Intrusion Detection Dataset (with a comprehensive CAN IDS dataset survey & guide).
CoRR, 2020
Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection.
CoRR, 2020
Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach.
Comput. Secur., 2020
An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
2019
IEEE Trans. Vis. Comput. Graph., 2019
Data-Driven Extraction of Vehicle States From CAN Bus Traffic for Cyberprotection and Safety.
IEEE Consumer Electron. Mag., 2019
Proceedings of the Science of Cyber Security - Second International Conference, 2019
Proceedings of the 36th International Conference on Machine Learning, 2019
Proceedings of the ACM Workshop on Automotive Cybersecurity, 2019
2018
How do information security workers use host data? A summary of interviews with security analysts.
CoRR, 2018
Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics (Extended Version).
CoRR, 2018
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018
Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
EGBTER: Capturing Degree Distribution, Clustering Coefficients, and Community Structure in a Single Random Graph Model.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018
2017
Malware Detection on General-Purpose Computers Using Power Consumption Monitoring: A Proof of Concept and Case Study.
CoRR, 2017
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017
Cybersecurity Automated Information Extraction Techniques: Drawbacks of Current Methods, and Enhanced Extractors.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017
Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017
Setting the threshold for high throughput detectors: A mathematical approach for ensembles of dynamic, heterogeneous, probabilistic anomaly detectors.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
2016
A multi-level anomaly detection algorithm for time-varying graph data with interactive visualization.
Soc. Netw. Anal. Min., 2016
ACM Comput. Surv., 2016
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016
2015
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
2014
Proceedings of the Cyber and Information Security Research Conference, 2014
2013
PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-security Concepts.
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013
2012
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012