Gordon Werner
Gordon Werner
Shanchieh Yang
Discovery of Rare yet Co-occurring Actions with Temporal Characteristics in Episodic Cyberattack Streams.
1-10
2022
ICCCN
https://doi.org/10.1109/ICCCN54977.2022.9868853
conf/icccn/2022
db/conf/icccn/icccn2022.html#WernerY22
Eleftherios E. Vlahakis
Gregory M. Provan
Gordon Werner
Shanchieh Yang
Nikolaos Athanasopoulos
Quantifying impact on safety from cyber-attacks on cyber-physical systems.
2022
abs/2211.12196
CoRR
https://doi.org/10.48550/arXiv.2211.12196
db/journals/corr/corr2211.html#abs-2211-12196
Gordon Werner
Shanchieh Jay Yang
Katie McConky
Near real-time intrusion alert aggregation using concept-based learning.
152-160
2021
CF
https://doi.org/10.1145/3457388.3458663
conf/cf/2021
db/conf/cf/cf2021.html#WernerYM21
Martin Husák
Giovanni Apruzzese
Shanchieh Jay Yang
Gordon Werner
Towards an Efficient Detection of Pivoting Activity.
980-985
2021
IM
https://ieeexplore.ieee.org/document/9464033
conf/im/2021
db/conf/im/im2021.html#HusakAYW21
Shanchieh Jay Yang
Ahmet Okutan
Gordon Werner
Shao-Hsuan Su
Ayush Goel
Nathan D. Cahill
Near Real-time Learning and Extraction of Attack Models from Intrusion Alerts.
2021
abs/2103.13902
CoRR
https://arxiv.org/abs/2103.13902
db/journals/corr/corr2103.html#abs-2103-13902
Ahmet Okutan
Shanchieh Jay Yang
Katie McConky
Gordon Werner
CAPTURE: Cyberattack Forecasting Using Non-Stationary Features with Time Lags.
205-213
2019
CNS
https://doi.org/10.1109/CNS.2019.8802639
conf/cns/2019
db/conf/cns/cns2019.html#OkutanYMW19
Ahmet Okutan
Gordon Werner
Shanchieh Jay Yang
Katie McConky
Forecasting cyberattacks with incomplete, imbalanced, and insignificant data.
15
2018
1
Cybersecur.
1
https://doi.org/10.1186/s42400-018-0016-5
db/journals/cybersec/cybersec1.html#OkutanWYM18
Gordon Werner
Shanchieh Yang
Katie McConky
Leveraging Intra-Day Temporal Variations to Predict Daily Cyberattack Activity.
58-63
2018
ISI
https://doi.org/10.1109/ISI.2018.8587350
conf/isi/2018
db/conf/isi/isi2018.html#WernerYM18
Ahmet Okutan
Gordon Werner
Katie McConky
Shanchieh Jay Yang
POSTER: Cyber Attack Prediction of Threats from Unconventional Resources (CAPTURE).
2563-2565
2017
CCS
https://doi.org/10.1145/3133956.3138834
conf/ccs/2017
db/conf/ccs/ccs2017.html#OkutanWMY17
Gordon Werner
Shanchieh Jay Yang
Katie McConky
Time series forecasting of cyber attack intensity.
18:1-18:3
2017
CISRC
https://doi.org/10.1145/3064814.3064831
conf/csiirw/2017
db/conf/csiirw/cisrc2017.html#WernerYM17
Gordon Werner
Steven Farris
Alan Kaminsky
Michael T. Kurdziel
Marcin Lukowiak
Stanislaw P. Radziszowski
Implementing authenticated encryption algorithm MK-3 on FPGA.
1225-1230
2016
MILCOM
https://doi.org/10.1109/MILCOM.2016.7795498
conf/milcom/2016
db/conf/milcom/milcom2016.html#WernerFKKLR16
Giovanni Apruzzese
Nikolaos Athanasopoulos
Nathan D. Cahill
Steven Farris
Ayush Goel
Martin Husák
Alan Kaminsky
Michael T. Kurdziel
Marcin Lukowiak
Katie McConky
Ahmet Okutan
Gregory M. Provan
Stanislaw P. Radziszowski
Shao-Hsuan Su
Eleftherios E. Vlahakis
Shanchieh Jay YangShanchieh Yang