Exchange pattern mining in the bitcoin transaction directed hypergraph S Ranshous, CA Joslyn, S Kreyling, K Nowak, NF Samatova, CL West, ... Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017 | 115 | 2017 |
A survey on almost difference sets K Nowak arXiv preprint arXiv:1409.0114, 2014 | 22 | 2014 |
Relative Hausdorff distance for network analysis SG Aksoy, KE Nowak, E Purvine, SJ Young Applied Network Science 4, 1-25, 2019 | 20 | 2019 |
A topological approach to representational data models E Purvine, S Aksoy, C Joslyn, K Nowak, B Praggastis, M Robinson Human Interface and the Management of Information. Interaction …, 2018 | 19 | 2018 |
Partial geometric difference families K Nowak, O Olmez, SY Song Journal of Combinatorial Designs 24 (3), 112-131, 2016 | 19 | 2016 |
Koopman representations of dynamic systems with control C Bakker, S Rosenthal, KE Nowak arXiv preprint arXiv:1908.02233, 2019 | 18 | 2019 |
A sheaf theoretical approach to uncertainty quantification of heterogeneous geolocation information CA Joslyn, L Charles, C DePerno, N Gould, K Nowak, B Praggastis, ... Sensors 20 (12), 3418, 2020 | 16 | 2020 |
Learning koopman operators for systems with isolated critical points C Bakker, KE Nowak, WS Rosenthal 2019 IEEE 58th Conference on Decision and Control (CDC), 7733-7739, 2019 | 15 | 2019 |
Ubergraphs: A definition of a recursive hypergraph structure C Joslyn, K Nowak arXiv preprint arXiv:1704.05547, 2017 | 14 | 2017 |
Anomaly detection using persistent homology P Bruillard, K Nowak, E Purvine 2016 Cybersecurity Symposium (CYBERSEC), 7-12, 2016 | 13 | 2016 |
Model-driven deception for control system environments W Hofer, T Edgar, D Vrabie, K Nowak 2019 IEEE International Symposium on Technologies for Homeland Security (HST …, 2019 | 10 | 2019 |
A family of partial geometric designs from three‐class association schemes K Nowak, O Olmez, SY Song Journal of Combinatorial Designs 24 (12), 533-552, 2016 | 10 | 2016 |
Partial geometric designs with prescribed automorphisms K Nowak, O Olmez Designs, Codes and Cryptography 80, 435-451, 2016 | 9 | 2016 |
Applying the scientific method to cybersecurity research MF Tardiff, GT Bonheyo, KA Cort, TW Edgar, NJ Hess, WJ Hutton, ... 2016 IEEE Symposium on Technologies for Homeland Security (HST), 1-8, 2016 | 7 | 2016 |
Minimum rank of graphs with loops C Bozeman, AV Ellsworth, L Hogben, JCH Lin, G Maurer, K Nowak, ... The Electronic Journal of Linear Algebra 27, 907-934, 2014 | 6 | 2014 |
High-fidelity model-driven deception platform for cyber-physical systems TW Edgar, DL Vrabie, WJ Hofer, KE Nowak US Patent 11,297,103, 2022 | 4 | 2022 |
Multi-game modeling for counter-smuggling C Bakker, JB Webster, KE Nowak, S Chatterjee, CJ Perkins, R Brigantic Reliability Engineering & System Safety 200, 106958, 2020 | 4 | 2020 |
(4, 2)-choosability of planar graphs with forbidden structures Z Berikkyzy, C Cox, M Dairyko, K Hogenson, M Kumbhat, B Lidický, ... Graphs and Combinatorics 33, 751-787, 2017 | 4 | 2017 |
Partial geometric designs and difference families KE Nowak Iowa State University, 2015 | 3 | 2015 |
Almost difference sets, normally regular digraphs and cyclotomic schemes from cyclotomy of order twelve K Nowak, O Olmez, SY Song arXiv preprint arXiv:1310.1164, 2013 | 3 | 2013 |