Research methods for cyber security TW Edgar, DO Manz Syngress, 2017 | 383 | 2017 |
Exploratory study TW Edgar, DO Manz Research methods for cyber security 29, 95-130, 2017 | 150 | 2017 |
Securing wide area measurement systems MD Hadley, JB McBride, TW Edgar, LR O’Neil, JD Johnson US Department of Energy, 2007 | 55 | 2007 |
Predictive modeling for insider threat mitigation FL Greitzer, P Paulson, L Kangas, LR Franklin, TW Edgar, DA Frincke Richland, WA: Pacific Northwest National Laboratory, 6-17, 2009 | 53 | 2009 |
Chapter 6-machine learning TW Edgar, DO Manz Research methods for cyber security, 153-173, 2017 | 45 | 2017 |
Chapter 2-science and cyber security TW Edgar, DO Manz Research methods for cyber security, 33-62, 2017 | 38 | 2017 |
Security and privacy in cyber-physical systems GA Fink, TW Edgar, TR Rice, DG MacDonald, CE Crawford Cyber-physical systems, 129-141, 2017 | 36 | 2017 |
Evaluating transactive controls of integrated transmission and distribution systems using the framework for network co-simulation J Hansen, T Edgar, J Daily, D Wu 2017 American control conference (ACC), 4010-4017, 2017 | 27 | 2017 |
Extracting dependencies between network assets using deep learning TE Carroll, S Chikkagoudar, TW Edgar, KJ Oler, KM Arthur, DM Johnson, ... US Patent 10,833,954, 2020 | 23 | 2020 |
Towards an experimental testbed facility for cyber-physical security research T Edgar, D Manz, T Carroll Proceedings of the Seventh Annual Workshop on Cyber Security and Information …, 2011 | 22 | 2011 |
Overview of security and privacy in cyber‐physical systems GA Fink, TW Edgar, TR Rice, DG MacDonald, CE Crawford Security and Privacy in Cyber‐Physical Systems: Foundations, Principles and …, 2017 | 17 | 2017 |
Chapter 3—Starting Your Research TW Edgar, DO Manz Research methods for cyber security, 63-92, 2017 | 17 | 2017 |
Realizing scientific methods for cyber security TE Carroll, D Manz, T Edgar, FL Greitzer Proceedings of the 2012 Workshop on Learning from Authoritative Security …, 2012 | 17 | 2012 |
AGA-12, Part 2 performance test results MD Hadley, KA Huston, TW Edgar Pacific Northwest National Laboratories, 2007 | 17 | 2007 |
Chapter 5-descriptive study TW Edgar, DO Manz Research methods for cyber security, 131-151, 2017 | 14 | 2017 |
Convenience sampling TW Edgar, DO Manz Research methods for cyber security, 2017 | 13 | 2017 |
Applied Experimentation T Edgar, D Manz Research Methods for Cyber Security, 271-297, 2019 | 10 | 2019 |
Model-driven deception for control system environments W Hofer, T Edgar, D Vrabie, K Nowak 2019 IEEE International Symposium on Technologies for Homeland Security (HST …, 2019 | 8 | 2019 |
Experiment as a service TW Edgar, TR Rice 2017 IEEE International Symposium on Technologies for Homeland Security (HST …, 2017 | 8 | 2017 |
A high-fidelity cyber-physical testbed-based benchmarking dataset for testing operational technology specific intrusion detection systems A Ashok, T Edgar 2021 IEEE International Symposium on Technologies for Homeland Security (HST …, 2021 | 7 | 2021 |