PUBLICATIONS and PRESENTATIONS

Found 11 results
Filters: Keyword is cybersecurity  [Clear All Filters]
Presentation
Imsand E. DFARS Cyber Rule De-mystified. National Cyber Summit, Huntsville, AL. 2018 .
Conference Proceedings
Cantrell WA, Showers PM, Petty MD. Verification of XML Encoded Petri Nets Modeling Cyberattacks. Proceedings of the 2019 AlaSim Conference and Exhibition. 2019 .
Cantrell WA, Mayfield KP, Petty MD, Whitaker TS, Bland JA. Structured Face Validation of Extended Petri Nets for Modeling Cyberattacks. 2018 AlaSim International Conference and Exposition. 2018 :123-139.
Bland JA, Colvett CD, Petty MD, Baker KR. Simulating Cyberattacks with a Petri Net Discrete Event Simulator. 6th Annual Conference on Computational Science and Computational Intelligence. 2019 .
Petty MD, Showers PM, Whitaker TS, Bland JA, Cantrell WA, Colvett CD, Maxwell KP. Modeling Cyberattacks with Extended Petri Nets: Research Program Update. 2019 AlaSim Conference and Exhibition. 2019 .
Petty MD, Whitaker TS, Bland JA, Cantrell WA, Mayfield KP. Modeling Cyberattacks with Extended Petri Nets: Research Program Overview and Status Report. 2019 International Conference on Modeling, Simulation, and Visualization Methods. 2019 :27-33.
Cantrell WA, Petty MD. A Model-based Systems Engineering Assessment of Cyber Security Modeling Methods. 2018 AlaSim International Conference and Exposition. 2018 :110-122.
Bland JA, Colvett CD, Cantrell WA, Mayfield KP, Petty MD, Whitaker TS. Machine Learning Cyberattack Strategies with Petri Nets with Players, Strategies, and Costs. 2019 National Cyber Summit. 2019 :1-16.
Bland JA, Cantrell WA, Mayfield KP, Petty MD, Whitaker TS. Machine Learning Cyberattack and Defense Strategies. 2018 AlaSim International Conference and Exposition. 2018 :81-87.
Mayfield KP, Petty MD, Whitaker TS, Bland JA, Cantrell WA. An Extended Petri Net Formalism for Modeling Cyberattacks. 2018 AlaSim International Conference and Exposition. 2018 :46-72.
Mayfield KP, Petty MD, Whitaker TS, Cantrell WA, Hice SM, McClendon J, Reyes PJ. Component Selection Process in Assembling Cyberattack Simulation Models. 2019 International Conference on Security and Management. 2019 :168-174.