Takip et
Frederick T. Sheldon
Frederick T. Sheldon
Professor
uidaho.edu üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Blockchain: properties and misconceptions
D Conte de Leon, AQ Stalick, AA Jillepalli, MA Haney, FT Sheldon
Asia Pacific Journal of Innovation and Entrepreneurship 11 (3), 286-300, 2017
2392017
IoT intrusion detection using machine learning with a novel high performing feature selection method
K Albulayhi, Q Abu Al-Haija, SA Alsuhibany, AA Jillepalli, ...
Applied Sciences 12 (10), 5015, 2022
1312022
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning
M Ashrafuzzaman, S Das, Y Chakhchoukh, S Shiva, FT Sheldon
Computers & Security 97, 101994, 2020
1192020
Metrics for maintainability of class inheritance hierarchies
FT Sheldon, K Jerath, H Chung
Journal of Software Maintenance and Evolution: Research and Practice 14 (3 …, 2002
1152002
A survey of crypto ransomware attack detection methodologies: An evolving outlook
A Alqahtani, FT Sheldon
Sensors 22 (5), 1837, 2022
1082022
IoT intrusion detection taxonomy, reference architecture, and analyses
K Albulayhi, AA Smadi, FT Sheldon, RK Abercrombie
Sensors 21 (19), 6432, 2021
962021
Detecting stealthy false data injection attacks in power grids using deep learning
M Ashrafuzzaman, Y Chakhchoukh, AA Jillepalli, PT Tosic, DC de Leon, ...
2018 14th International Wireless Communications & Mobile Computing …, 2018
882018
Reliability measurement: From theory to practice
FT Sheldon, KM Kavi, RC Tausworthe, JT Yu, R Brettschneider, ...
IEEE Software 9 (4), 13-20, 1992
801992
Quantifying security threats and their potential impacts: a case study
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Innovations in Systems and Software Engineering 6, 269-281, 2010
742010
Network intrusion detection and comparative analysis using ensemble machine learning and feature selection
S Das, S Saha, AT Priyoti, EK Roy, FT Sheldon, A Haque, S Shiva
IEEE transactions on network and service management 19 (4), 4821-4833, 2021
702021
A methodology to evaluate agent oriented software engineering techniques
CE Lin, KM Kavi, FT Sheldon, KM Daley, RK Abercrombie
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
702007
The insecurity of wireless networks
FT Sheldon, JM Weber, SM Yoo, WD Pan
IEEE Security & Privacy 10 (4), 54-61, 2012
662012
Isaac: The idaho cps smart grid cybersecurity testbed
IA Oyewumi, AA Jillepalli, P Richardson, M Ashrafuzzaman, BK Johnson, ...
2019 IEEE Texas Power and Energy Conference (TPEC), 1-6, 2019
632019
Access control in fog computing: Challenges and research agenda
MA Aleisa, A Abuhussein, FT Sheldon
IEEE Access 8, 83986-83999, 2020
512020
Empirical evaluation of the ensemble framework for feature selection in ddos attack
S Das, D Venugopal, S Shiva, FT Sheldon
2020 7th IEEE International Conference on Cyber Security and Cloud Computing …, 2020
482020
A short survey on quantum computers
Y Kanamori, SM Yoo, WD Pan, FT Sheldon
International Journal of Computers and Applications 28 (3), 227-233, 2006
472006
Cyberspace security system
RK Abercrombie, FT Sheldon, EM Ferragut
US Patent 8,762,188, 2014
452014
Methodology for evaluating security controls based on key performance indicators and stakeholder mission
FT Sheldon, RK Abercrombie, A Mili
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
452009
A data integrity verification scheme in mobile cloud computing
C Lin, Z Shen, Q Chen, FT Sheldon
journal of Network and Computer Applications 77, 146-151, 2017
442017
An adaptive deep-ensemble anomaly-based intrusion detection system for the internet of things
K Albulayhi, FT Sheldon
2021 IEEE world AI IoT congress (AIIoT), 0187-0196, 2021
412021
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20