Travis Atkison
Orcid: 0000-0001-7258-7355
According to our database1,
Travis Atkison
authored at least 43 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Sensors, June, 2024
Exploring Firefly and Greywolf Algorithms for Multi-objective Optimization in Wireless Sensor Networks.
Proceedings of the 2024 ACM Southeast Conference, 2024
2023
Advancing Short-Term Traffic Congestion Prediction: Navigating Challenges in Learning-Based Approaches.
Proceedings of the Applied Intelligence - First International Conference, 2023
2022
Comput. Sci. Eng., 2022
Reinforcement Learning based Cyberattack Model for Adaptive Traffic Signal Controller in Connected Transportation Systems.
CoRR, 2022
2021
An Innovative Attack Modelling and Attack Detection Approach for a Waiting Time-based Adaptive Traffic Signal Controller.
CoRR, 2021
2020
Public Transp., 2020
Classification on grade, price, and region with multi-label and multi-target methods in wineinformatics.
Big Data Min. Anal., 2020
2019
Privacy Challenges and Solutions in Smart Health: A Systematic Literature Review Extraction Forms.
Dataset, May, 2019
Investigating Personally Identifiable Information Posted on Twitter Before and After Disasters.
Proceedings of the Services - SERVICES 2019, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the Big Data - BigData 2019, 2019
2018
J. Digit. Forensics Secur. Law, 2018
Feature Extraction Optimization for Network Intrusion Detection in Control System Networks.
Int. J. Netw. Secur., 2018
Proceedings of the ACMSE 2018 Conference, Richmond, KY, USA, March 29-31, 2018, 2018
Proceedings of the ACMSE 2018 Conference, Richmond, KY, USA, March 29-31, 2018, 2018
Proceedings of the ACMSE 2018 Conference, Richmond, KY, USA, March 29-31, 2018, 2018
2017
A Wineinformatics Study for White-box Classification Algorithms to Understand and Evaluate Wine Judges.
Trans. Mach. Learn. Data Min., 2017
A Power Grid Incident Identification Based on Physically Derived Cyber-Event Detection.
J. Digit. Forensics Secur. Law, 2017
Int. J. Crit. Infrastructures, 2017
Proceedings of the 13th International Conference on Natural Computation, 2017
Proceedings of the 2017 ACM Southeast Regional Conference, 2017
Proceedings of the 2017 ACM Southeast Regional Conference, 2017
Proceedings of the 2017 ACM Southeast Regional Conference, 2017
Proceedings of the 2017 ACM Southeast Regional Conference, 2017
2016
IEEE Trans. Dependable Secur. Comput., 2016
2014
Proceedings of the Cyber and Information Security Research Conference, 2014
Detection of SSH host spoofing in control systems through network telemetry analysis.
Proceedings of the Cyber and Information Security Research Conference, 2014
2013
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013
Proceedings of the ACM Southeast Regional Conference 2013, 2013
Proceedings of the ACM Southeast Regional Conference 2013, 2013
Evolution of digital forensics in virtualization by using virtual machine introspection.
Proceedings of the ACM Southeast Regional Conference 2013, 2013
2012
Int. J. Comput. Appl. Technol., 2012
Applying random projection to the classification of malicious applications using data mining algorithms.
Proceedings of the 50th Annual Southeast Regional Conference, 2012
Proceedings of the 50th Annual Southeast Regional Conference, 2012
2011
Int. J. Secur. Softw. Eng., 2011
Using randomized projection techniques to aid in detecting high-dimensional malicious applications.
Proceedings of the 49th Annual Southeast Regional Conference, 2011
Proceedings of the 49th Annual Southeast Regional Conference, 2011
2010
Aiding prediction algorithms in detecting high-dimensional malicious applications using a randomized projection technique.
Proceedings of the 48th Annual Southeast Regional Conference, 2010
2009
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications.
Proceedings of the 47th Annual Southeast Regional Conference, 2009
2001
Case Study: Visualization and Information Retrieval Techniques for Network Intrusion Detection.
Proceedings of the 3rd Joint Eurographics - IEEE TCVG Symposium on Visualization, 2001
2000
Proceedings of the 26th International Computer Measurement Group Conference, 2000