Scott R. Graham

Orcid: 0000-0003-0193-1192

According to our database1, Scott R. Graham authored at least 58 papers between 2003 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2005
2010
2015
2020
2025
0
1
2
3
4
5
6
7
1
2
3
2
3
2
1
2
2
2
2
1
1
3
2
5
4
5
1
1
2
3
1
2
3
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Malware classification through Abstract Syntax Trees and L-moments.
Comput. Secur., 2025

2024
ScriptBlock Smuggling: Uncovering Stealthy Evasion Techniques in PowerShell and .NET Environments.
J. Cybersecur. Priv., June, 2024

CuMONITOR: Continuous Monitoring of Microarchitecture for Software Task Identification and Classification.
DTRAP, 2024

2023
IronNetInjector: Weaponizing .NET Dynamic Language Runtime Engines.
DTRAP, 2023

Classifying Co-resident Computer Programs Using Information Revealed by Resource Contention.
DTRAP, 2023

Introduction to the Special Issue on the Digital Threats of Hardware Security.
DTRAP, 2023

Towards Hardware-Based Application Fingerprinting with Microarchitectural Signals for Zero Trust Environments.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
MADFAM: MicroArchitectural Data Framework and Methodology.
IEEE Access, 2022

Identification of Return-Oriented Programming Attacks Using RISC-V Instruction Trace Data.
IEEE Access, 2022

Evaluating the Use of Boot Image Encryption on the TALOS II Architecture.
Proceedings of the Critical Infrastructure Protection XVI, 2022

Securing Infiniband Traffic with Bluefield-2 Data Processing Units.
Proceedings of the Critical Infrastructure Protection XVI, 2022

Leveraging Confidential Computing to Enable Secure Information Sharing.
Proceedings of the Critical Infrastructure Protection XVI, 2022

2021
Extending the Quality of Secure Service Model to Multi-Hop Networks.
J. Cybersecur. Priv., December, 2021

Model for Quantifying the Quality of Secure Service.
J. Cybersecur. Priv., May, 2021

SPARC: Statistical Performance Analysis With Relevance Conclusions.
IEEE Open J. Comput. Soc., 2021

Anomaly Detection in Automation Controllers.
Proceedings of the Critical Infrastructure Protection XV, 2021

InfiniBand Network Monitoring: Challenges and Possibilities.
Proceedings of the Critical Infrastructure Protection XV, 2021

2020
Assessing the Cyber Risk of Small Unmanned Aerial Vehicles.
Proceedings of the Critical Infrastructure Protection XIV, 2020

Securing an InfiniBand Network and its Effect on Performance.
Proceedings of the Critical Infrastructure Protection XIV, 2020

Simulation-Based Logic Bomb Identification and Verification for Unmanned Aerial Vehicles.
Proceedings of the Critical Infrastructure Protection XIV, 2020

Multi-channel Security Through Data Fragmentation.
Proceedings of the Critical Infrastructure Protection XIV, 2020

Engaging Empirical Dynamic Modeling to Detect Intrusions in Cyber-Physical Systems.
Proceedings of the Critical Infrastructure Protection XIV, 2020

2019
Looking Under the Hood of Z-Wave: Volatile Memory Introspection for the ZW0301 Transceiver.
ACM Trans. Cyber Phys. Syst., 2019

Unsupervised Time Series Extraction from Controller Area Network Payloads.
CoRR, 2019

Vulnerability Assessment of InfiniBand Networking.
Proceedings of the Critical Infrastructure Protection XIII, 2019

Electronic Control Unit Discrimination Using Wired Signal Distinct Native Attributes.
Proceedings of the Critical Infrastructure Protection XIII, 2019

Vehicle Identification and Route Reconstruction via TPMS Data Leakage.
Proceedings of the Critical Infrastructure Protection XIII, 2019

Modeling Liability Data Collection Systems for Intelligent Transportation Infrastructure Using Hyperledger Fabric.
Proceedings of the Critical Infrastructure Protection XIII, 2019

2018
Pattern-of-Life Modeling in Smart Homes.
IEEE Internet Things J., 2018

Unsupervised Time Series Extraction from Controller Area Network Payloads.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Securing Data in Power-Limited Sensor Networks Using Two-Channel Communications.
Proceedings of the Critical Infrastructure Protection XII, 2018

Reversing a Lattice ECP3 FPGA for Bitstream Protection.
Proceedings of the Critical Infrastructure Protection XII, 2018

Persistent Human Control in a Reservation-Based Autonomous Intersection Protocol.
Proceedings of the Critical Infrastructure Protection XII, 2018

A security evaluation of popular Internet of Things protocols for manufacturers.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

2017
Enabling Bluetooth Low Energy auditing through synchronized tracking of multiple connections.
Int. J. Crit. Infrastructure Prot., 2017

The Z-Wave routing protocol and its security implications.
Comput. Secur., 2017

Considerations for secure and resilient satellite architectures.
Proceedings of the 2017 International Conference on Cyber Conflict, 2017

2016
Comparison of Real-Time, Mobile Data Bus Architectures.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

2012
Solving Multicommodity Capacitated Network Design Problems Using Multiobjective Evolutionary Algorithms.
IEEE Trans. Evol. Comput., 2012

Integrating disruption-prone links into reliable networks: a transmission control protocol friendly approach.
IET Commun., 2012

2011
Distributed Fault-Tolerant Quality of Wireless Networks.
IEEE Trans. Mob. Comput., 2011

Fundamental Limits on Synchronizing Clocks Over Networks.
IEEE Trans. Autom. Control., 2011

2009
Abstractions, Architecture, Mechanisms, and a Middleware for Networked Control.
IEEE Trans. Autom. Control., 2009

On the application of classification concepts to systems engineering design and evaluation.
Syst. Eng., 2009

2008
A methodology for unit testing actors in proprietary discrete event based simulations.
Proceedings of the 2008 Winter Simulation Conference, Global Gateway to Discovery, 2008

Research and analysis of simulation-based networks through multi-objective visualization.
Proceedings of the 2008 Winter Simulation Conference, Global Gateway to Discovery, 2008

2007
An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Multiobjective evolutionary algorithms for designing capacitated network centric communications.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

Solving Multicommodity Capacitated Network Design Problems using a Multiobjective Evolutionary Algorithm.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, 2007

2006
Reducing Risk by Managing Software Related Failures in Networked Control Systems.
Proceedings of the 45th IEEE Conference on Decision and Control, 2006

2005
Co-Design Based Approach to Improve Robustness in Networked Control Systems.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

Middleware and Abstractions in the Convergence of Control with Communication and Computation.
Proceedings of the 44th IEEE IEEE Conference on Decision and Control and 8th European Control Conference Control, 2005

2004
Issues in the Convergence of Control With Communication and Computation
PhD thesis, 2004

Service Continuity in Networked Control Using Etherware.
IEEE Distributed Syst. Online, 2004

Etherware: Domainware for Wireless Control Networks.
Proceedings of the 7th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2004), 2004

Time in general-purpose control systems: the Control Time Protocol and an experimental evaluation.
Proceedings of the 43rd IEEE Conference on Decision and Control, 2004

Issues in the convergence of control with communication and computing: proliferation, architecture, design, services, and middleware.
Proceedings of the 43rd IEEE Conference on Decision and Control, 2004

2003
The Convergence of Control, Communication, and Computation.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003


  Loading...