Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Vincent Urias
@article{DBLP:journals/corr/abs-2301-12013, author = {Elijah Pelofske and Lorie M. Liebrock and Vincent Urias}, title = {Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence}, journal = {CoRR}, volume = {abs/2301.12013}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.12013}, doi = {10.48550/ARXIV.2301.12013}, eprinttype = {arXiv}, eprint = {2301.12013}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-12013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/JenkinsLU21, author = {Donovan Jenkins and Lorie M. Liebrock and Vince Urias}, title = {Designing a Modular and Distributed Web Crawler Focused on Unstructured Cybersecurity Intelligence}, booktitle = {2021 International Carnahan Conference on Security Technology, {ICCST} 2021, Hatfield, United Kingdom, October 11-15, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCST49569.2021.9717379}, doi = {10.1109/ICCST49569.2021.9717379}, timestamp = {Wed, 09 Mar 2022 09:34:35 +0100}, biburl = {https://dblp.org/rec/conf/iccst/JenkinsLU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/YuMZT0XULCYG21, author = {Le Yu and Shiqing Ma and Zhuo Zhang and Guanhong Tao and Xiangyu Zhang and Dongyan Xu and Vincent E. Urias and Han Wei Lin and Gabriela F. Ciocarlie and Vinod Yegneswaran and Ashish Gehani}, title = {ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/alchemist-fusing-application-and-audit-logs-for-precise-attack-provenance-without-instrumentation/}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/YuMZT0XULCYG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-02473, author = {Elijah Pelofske and Lorie M. Liebrock and Vincent Urias}, title = {An Enhanced Machine Learning Topic Classification Methodology for Cybersecurity}, journal = {CoRR}, volume = {abs/2109.02473}, year = {2021}, url = {https://arxiv.org/abs/2109.02473}, eprinttype = {arXiv}, eprint = {2109.02473}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-02473.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WalkupEXUL20, author = {Gregory Walkup and Sriharsha Etigowni and Dongyan Xu and Vincent Urias and Han W. Lin}, title = {Forensic Investigation of Industrial Control Systems Using Deterministic Replay}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162232}, doi = {10.1109/CNS48642.2020.9162232}, timestamp = {Thu, 13 Aug 2020 14:43:08 +0200}, biburl = {https://dblp.org/rec/conf/cns/WalkupEXUL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-11143, author = {Jonathan Crussell and David Fritz and Vince Urias}, title = {Automated Discovery for Emulytics}, journal = {CoRR}, volume = {abs/2003.11143}, year = {2020}, url = {https://arxiv.org/abs/2003.11143}, eprinttype = {arXiv}, eprint = {2003.11143}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-11143.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/StoutLUTSD18, author = {William M. S. Stout and Brian P. Van Leeuwen and Vincent E. Urias and Julian Tuminaro and Spencer Schrock and Nomaan Dossaji}, title = {Leveraging a LiveNirtual/Constructive Testbed for the Evaluation of Moving Target Defenses}, booktitle = {2018 International Carnahan Conference on Security Technology, {ICCST} 2018, Montreal, QC, Canada, October 22-25, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CCST.2018.8585478}, doi = {10.1109/CCST.2018.8585478}, timestamp = {Wed, 09 Mar 2022 16:39:53 +0100}, biburl = {https://dblp.org/rec/conf/iccst/StoutLUTSD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/UriasLSL18, author = {Vincent E. Urias and Brian P. Van Leeuwen and William M. S. Stout and Han Lin}, title = {Applying a Threat Model to Cloud Computing}, booktitle = {2018 International Carnahan Conference on Security Technology, {ICCST} 2018, Montreal, QC, Canada, October 22-25, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CCST.2018.8585471}, doi = {10.1109/CCST.2018.8585471}, timestamp = {Tue, 15 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/UriasLSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/UriasSLL18, author = {Vincent E. Urias and William M. S. Stout and Brian P. Van Leeuwen and Han Lin}, title = {Cyber Range Infrastructure Limitations and Needs of Tomorrow: {A} Position Paper}, booktitle = {2018 International Carnahan Conference on Security Technology, {ICCST} 2018, Montreal, QC, Canada, October 22-25, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CCST.2018.8585460}, doi = {10.1109/CCST.2018.8585460}, timestamp = {Tue, 15 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/UriasSLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sc2/UriasSLL18, author = {Vincent E. Urias and William M. S. Stout and Caleb Loverro and Brian P. Van Leeuwen}, title = {Get Your Head Out of the Clouds: The Illusion of Confidentiality {\&} Privacy}, booktitle = {8th {IEEE} International Symposium on Cloud and Service Computing, {SC2} 2018, Paris, France, November 18-21, 2018}, pages = {57--66}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SC2.2018.00015}, doi = {10.1109/SC2.2018.00015}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sc2/UriasSLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/RaybournKFU18, author = {Elaine M. Raybourn and Michael Kunz and David Fritz and Vince Urias}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {A Zero-Entry Cyber Range Environment for Future Learning Ecosystems}, booktitle = {Cyber-Physical Systems Security}, pages = {93--109}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_5}, doi = {10.1007/978-3-319-98935-8\_5}, timestamp = {Fri, 08 Mar 2019 12:57:04 +0100}, biburl = {https://dblp.org/rec/books/sp/18/RaybournKFU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/LeeuwenEU17, author = {Brian P. Van Leeuwen and John Eldridge and Vincent Urias}, title = {Cyber analysis emulation platform for wireless communication network protocols}, booktitle = {International Carnahan Conference on Security Technology, {ICCST} 2017, Madrid, Spain, October 23-26, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CCST.2017.8167803}, doi = {10.1109/CCST.2017.8167803}, timestamp = {Wed, 09 Mar 2022 16:39:53 +0100}, biburl = {https://dblp.org/rec/conf/iccst/LeeuwenEU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/UriasSLGLM17, author = {Vincent E. Urias and William M. S. Stout and Jean{-}Luc Watson and Cole Grim and Lorie M. Liebrock and Monzy Merza}, title = {Technologies to enable cyber deception}, booktitle = {International Carnahan Conference on Security Technology, {ICCST} 2017, Madrid, Spain, October 23-26, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CCST.2017.8167793}, doi = {10.1109/CCST.2017.8167793}, timestamp = {Wed, 30 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/UriasSLGLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/UriasSLY16, author = {Vincent E. Urias and William M. S. Stout and Caleb Loverro and John W. Young}, title = {Hypervisor Assisted Forensics and Incident Response in the Cloud}, booktitle = {2016 {IEEE} International Conference on Computer and Information Technology, {CIT} 2016, Nadi, Fiji, December 8-10, 2016}, pages = {768--775}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIT.2016.104}, doi = {10.1109/CIT.2016.104}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/IEEEcit/UriasSLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/LeeuwenSU16, author = {Brian P. Van Leeuwen and William M. S. Stout and Vincent Urias}, title = {{MTD} assessment framework with cyber attack modeling}, booktitle = {{IEEE} International Carnahan Conference on Security Technology, {ICCST} 2016, Orlando, FL, USA, October 24-27, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CCST.2016.7815722}, doi = {10.1109/CCST.2016.7815722}, timestamp = {Wed, 09 Mar 2022 16:39:53 +0100}, biburl = {https://dblp.org/rec/conf/iccst/LeeuwenSU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/StoutU16, author = {William M. S. Stout and Vincent E. Urias}, title = {Challenges to securing the Internet of Things}, booktitle = {{IEEE} International Carnahan Conference on Security Technology, {ICCST} 2016, Orlando, FL, USA, October 24-27, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CCST.2016.7815675}, doi = {10.1109/CCST.2016.7815675}, timestamp = {Wed, 07 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/StoutU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/LeeuwenSU16, author = {Brian P. Van Leeuwen and William M. S. Stout and Vincent E. Urias}, editor = {Jerry Brand and Matthew C. Valenti and Akinwale Akinpelu and Bharat T. Doshi and Bonnie L. Gorsic}, title = {Empirical assessment of network-based Moving Target Defense approaches}, booktitle = {2016 {IEEE} Military Communications Conference, {MILCOM} 2016, Baltimore, MD, USA, November 1-3, 2016}, pages = {764--769}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/MILCOM.2016.7795421}, doi = {10.1109/MILCOM.2016.7795421}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/LeeuwenSU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/UriasSL15, author = {Vincent E. Urias and William M. S. Stout and Caleb Loverro}, title = {Computer network deception as a Moving Target Defense}, booktitle = {International Carnahan Conference on Security Technology, {ICCST} 2015, Taipei, Taiwan, September 21-24, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CCST.2015.7389665}, doi = {10.1109/CCST.2015.7389665}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/iccst/UriasSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/LeeuwenSU15, author = {Brian P. Van Leeuwen and William M. S. Stout and Vincent Urias}, editor = {Qinqing Zhang and Jerry Brand and Thomas G. MacDonald and Bharat T. Doshi and Bonnie L. Gorsic}, title = {Operational cost of deploying Moving Target Defenses defensive work factors}, booktitle = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa, FL, USA, October 26-28, 2015}, pages = {966--971}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/MILCOM.2015.7357570}, doi = {10.1109/MILCOM.2015.7357570}, timestamp = {Thu, 07 Nov 2019 09:04:27 +0100}, biburl = {https://dblp.org/rec/conf/milcom/LeeuwenSU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/LeeuwenUGI13, author = {Brian P. Van Leeuwen and Vincent Urias and Casey Glatter and Alex Interrante{-}Grant}, editor = {Joe Senftle and Mike Beltrani and Kari Karwedsky}, title = {Testbed for Cellular Telecommunications Cyber Vulnerability Analysis}, booktitle = {32th {IEEE} Military Communications Conference, {MILCOM} 2013, San Diego, CA, USA, November 18-20, 2013}, pages = {1391--1397}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/MILCOM.2013.236}, doi = {10.1109/MILCOM.2013.236}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/LeeuwenUGI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/UriasLR12, author = {Vincent Urias and Brian P. Van Leeuwen and Bryan Richardson}, title = {Supervisory Command and Data Acquisition {(SCADA)} system cyber security analysis using a live, virtual, and constructive {(LVC)} testbed}, booktitle = {31st {IEEE} Military Communications Conference, {MILCOM} 2012, Orlando, FL, USA, October 29 - November 1, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/MILCOM.2012.6415818}, doi = {10.1109/MILCOM.2012.6415818}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/UriasLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/UriasHL08, author = {Vincent Urias and Curtis Hash and Lorie M. Liebrock}, title = {Consideration of Issues for Parallel Digital Forensics of {RAID} Systems}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {4}, pages = {196--208}, year = {2008}, url = {https://doi.org/10.1080/15567280903140953}, doi = {10.1080/15567280903140953}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/UriasHL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/LiebrockMBPCSU07, author = {Lorie M. Liebrock and Nico Marrero and David P. Burton and Ron Prine and E. Cornelius and M. Shakamuri and Vincent Urias}, editor = {Yookun Cho and Roger L. Wainwright and Hisham Haddad and Sung Y. Shin and Yong Wan Koo}, title = {A preliminary design for digital forensics analysis of terabyte size data sets}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007}, pages = {190--191}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1244002.1244052}, doi = {10.1145/1244002.1244052}, timestamp = {Sun, 02 Jun 2019 21:18:37 +0200}, biburl = {https://dblp.org/rec/conf/sac/LiebrockMBPCSU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.