Vincent Urias

According to our database1, Vincent Urias authored at least 27 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Automated Software Vulnerability Static Code Analysis Using Generative Pre-Trained Transformer Models.
IACR Cryptol. ePrint Arch., 2024

Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models.
IACR Cryptol. ePrint Arch., 2024

Automated Multi-Language to English Machine Translation Using Generative Pre-Trained Transformers.
CoRR, 2024

DIONYSUS - Deception Networks for the Cybersecurity of Physical Protection Systems.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

2023
Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence.
CoRR, 2023

2021
An Enhanced Machine Learning Topic Classification Methodology for Cybersecurity.
CoRR, 2021

ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Designing a Modular and Distributed Web Crawler Focused on Unstructured Cybersecurity Intelligence.
Proceedings of the 2021 International Carnahan Conference on Security Technology, 2021

2020
Automated Discovery for Emulytics.
CoRR, 2020

Forensic Investigation of Industrial Control Systems Using Deterministic Replay.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2018
Get Your Head Out of the Clouds: The Illusion of Confidentiality & Privacy.
Proceedings of the 8th IEEE International Symposium on Cloud and Service Computing, 2018

Cyber Range Infrastructure Limitations and Needs of Tomorrow: A Position Paper.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

Applying a Threat Model to Cloud Computing.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

Leveraging a LiveNirtual/Constructive Testbed for the Evaluation of Moving Target Defenses.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

A Zero-Entry Cyber Range Environment for Future Learning Ecosystems.
Proceedings of the Cyber-Physical Systems Security., 2018

2017
Technologies to enable cyber deception.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Cyber analysis emulation platform for wireless communication network protocols.
Proceedings of the International Carnahan Conference on Security Technology, 2017

2016
Empirical assessment of network-based Moving Target Defense approaches.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Challenges to securing the Internet of Things.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2016

MTD assessment framework with cyber attack modeling.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2016

Hypervisor Assisted Forensics and Incident Response in the Cloud.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Operational cost of deploying Moving Target Defenses defensive work factors.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Computer network deception as a Moving Target Defense.
Proceedings of the International Carnahan Conference on Security Technology, 2015

2013
Testbed for Cellular Telecommunications Cyber Vulnerability Analysis.
Proceedings of the 32th IEEE Military Communications Conference, 2013

2012
Supervisory Command and Data Acquisition (SCADA) system cyber security analysis using a live, virtual, and constructive (LVC) testbed.
Proceedings of the 31st IEEE Military Communications Conference, 2012

2008
Consideration of Issues for Parallel Digital Forensics of RAID Systems.
J. Digit. Forensic Pract., 2008

2007
A preliminary design for digital forensics analysis of terabyte size data sets.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007


  Loading...