Adam Slagell
Adam Slagell
ESnet Energy Sciences Network
Verified email at es.net - Homepage
Title
Cited by
Cited by
Year
Adapting bro into scada: building a specification-based intrusion detection system for the dnp3 protocol
H Lin, A Slagell, C Di Martino, Z Kalbarczyk, RK Iyer
Proceedings of the Eighth Annual Cyber Security and Information Intelligence …, 2013
1082013
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs.
AJ Slagell, K Lakkaraju, K Luo
LISA 6, 3-8, 2006
862006
Sharing computer network logs for security and privacy: A motivation for new methodologies of anonymization
A Slagell, W Yurcik
Workshop of the 1st International Conference on Security and Privacy for …, 2005
782005
Runtime semantic security analysis to detect and mitigate control-related attacks in power grids
H Lin, A Slagell, ZT Kalbarczyk, PW Sauer, RK Iyer
IEEE Transactions on Smart Grid 9 (1), 163-178, 2016
742016
The design of VisFlowConnect-IP: a link analysis system for IP security situational awareness
X Yin, W Yurcik, A Slagell
Third IEEE International Workshop on Information Assurance (IWIA'05), 141-153, 2005
582005
Credential wallets: A classification of credential repositories highlighting myproxy
WJ Yurcik, RF Bonilla, A Stagell, J Basney
TPRC, 2003
512003
Semantic security analysis of SCADA networks to detect malicious control commands in power grids
H Lin, A Slagell, Z Kalbarczyk, PW Sauer, RK Iyer
Proceedings of the first ACM workshop on Smart energy grid security, 29-34, 2013
472013
Closing-the-loop in nvisionip: Integrating discovery and search in security visualizations
K Lakkaraju, R Bearavolu, A Slagell, W Yurcik, S North
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 75-82, 2005
472005
A taxonomy and adversarial model for attacks against network log anonymization
J King, K Lakkaraju, A Slagell
Proceedings of the 2009 ACM symposium on Applied Computing, 1286-1293, 2009
422009
Evaluating the utility of anonymized network traces for intrusion detection
K Lakkaraju, A Slagell
Proceedings of the 4th international conference on Security and privacy in …, 2008
412008
SELS: a secure e-mail list service
H Khurana, A Slagell, R Bonilla
Proceedings of the 2005 ACM symposium on Applied computing, 306-313, 2005
402005
A survey of PKI components and scalability issues
A Slagell, R Bonilla, W Yurcik
2006 IEEE International Performance Computing and Communications Conference …, 2006
392006
Canine: A combined conversion and anonymization tool for processing netflows for security
Y Li, A Slagell, K Luo, W Yurcik
International conference on telecommunication systems modeling and analysis 21, 2005
302005
Canine: A combined conversion and anonymization tool for processing netflows for security
Y Li, A Slagell, K Luo, W Yurcik
International conference on telecommunication systems modeling and analysis 21, 2005
302005
Network log anonymization: Application of crypto-pan to cisco netflows
A Slagell, J Wang, W Yurcik
Proceedings of the Workshop on Secure Knowledge Management 2004, 2004
302004
Sharing network logs for computer forensics: A new tool for the anonymization of netflow records
AJ Slagell, Y Li, K Luo
Workshop of the 1st International Conference on Security and Privacy for …, 2005
292005
Preemptive intrusion detection: Theoretical framework and real-world measurements
P Cao, E Badger, Z Kalbarczyk, R Iyer, A Slagell
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-12, 2015
282015
Known-Plaintext Attack Against a Permutation Based VideoEncryption Algorithm
AJ Slagell
January, 2004
252004
The bro network security monitor
V Paxson, R Sommer, S Hall, C Kreibich, J Barlow, G Clark, G Maier, ...
2015-12-20]. https:∥ www. bro. org, 2012
242012
VisFlowConnect-IP: an animated link analysis tool for visualizing netflows
X Yin, W Yurcik, A Slagell
FLOCON-Network Flow Analysis Workshop (Network Flow Analysis for Security …, 2005
162005
The system can't perform the operation now. Try again later.
Articles 1–20