Gordon Werner Gordon Werner Shanchieh Yang Discovery of Rare yet Co-occurring Actions with Temporal Characteristics in Episodic Cyberattack Streams. 1-10 2022 ICCCN https://doi.org/10.1109/ICCCN54977.2022.9868853 conf/icccn/2022 db/conf/icccn/icccn2022.html#WernerY22
Eleftherios E. Vlahakis Gregory M. Provan Gordon Werner Shanchieh Yang Nikolaos Athanasopoulos Quantifying impact on safety from cyber-attacks on cyber-physical systems. 2022 abs/2211.12196 CoRR https://doi.org/10.48550/arXiv.2211.12196 db/journals/corr/corr2211.html#abs-2211-12196
Gordon Werner Shanchieh Jay Yang Katie McConky Near real-time intrusion alert aggregation using concept-based learning. 152-160 2021 CF https://doi.org/10.1145/3457388.3458663 conf/cf/2021 db/conf/cf/cf2021.html#WernerYM21 Martin Husák Giovanni Apruzzese Shanchieh Jay Yang Gordon Werner Towards an Efficient Detection of Pivoting Activity. 980-985 2021 IM https://ieeexplore.ieee.org/document/9464033 conf/im/2021 db/conf/im/im2021.html#HusakAYW21
Shanchieh Jay Yang Ahmet Okutan Gordon Werner Shao-Hsuan Su Ayush Goel Nathan D. Cahill Near Real-time Learning and Extraction of Attack Models from Intrusion Alerts. 2021 abs/2103.13902 CoRR https://arxiv.org/abs/2103.13902 db/journals/corr/corr2103.html#abs-2103-13902
Ahmet Okutan Shanchieh Jay Yang Katie McConky Gordon Werner CAPTURE: Cyberattack Forecasting Using Non-Stationary Features with Time Lags. 205-213 2019 CNS https://doi.org/10.1109/CNS.2019.8802639 conf/cns/2019 db/conf/cns/cns2019.html#OkutanYMW19
Ahmet Okutan Gordon Werner Shanchieh Jay Yang Katie McConky Forecasting cyberattacks with incomplete, imbalanced, and insignificant data. 15 2018 1 Cybersecur. 1 https://doi.org/10.1186/s42400-018-0016-5 db/journals/cybersec/cybersec1.html#OkutanWYM18
Gordon Werner Shanchieh Yang Katie McConky Leveraging Intra-Day Temporal Variations to Predict Daily Cyberattack Activity. 58-63 2018 ISI https://doi.org/10.1109/ISI.2018.8587350 conf/isi/2018 db/conf/isi/isi2018.html#WernerYM18 Ahmet Okutan Gordon Werner Katie McConky Shanchieh Jay Yang POSTER: Cyber Attack Prediction of Threats from Unconventional Resources (CAPTURE). 2563-2565 2017 CCS https://doi.org/10.1145/3133956.3138834 conf/ccs/2017 db/conf/ccs/ccs2017.html#OkutanWMY17 Gordon Werner Shanchieh Jay Yang Katie McConky Time series forecasting of cyber attack intensity. 18:1-18:3 2017 CISRC https://doi.org/10.1145/3064814.3064831 conf/csiirw/2017 db/conf/csiirw/cisrc2017.html#WernerYM17 Gordon Werner Steven Farris Alan Kaminsky Michael T. Kurdziel Marcin Lukowiak Stanislaw P. Radziszowski Implementing authenticated encryption algorithm MK-3 on FPGA. 1225-1230 2016 MILCOM https://doi.org/10.1109/MILCOM.2016.7795498 conf/milcom/2016 db/conf/milcom/milcom2016.html#WernerFKKLR16 Giovanni Apruzzese Nikolaos Athanasopoulos Nathan D. Cahill Steven Farris Ayush Goel Martin Husák Alan Kaminsky Michael T. Kurdziel Marcin Lukowiak Katie McConky Ahmet Okutan Gregory M. Provan Stanislaw P. Radziszowski Shao-Hsuan Su Eleftherios E. Vlahakis Shanchieh Jay YangShanchieh Yang
  NODES