Wei Li, Rayford B. Vaughn Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs. [Citation Graph (0, 0)][DBLP] CCGRID, 2006, pp:26- [Conf]
Rayford B. Vaughn A Report on Industrial Transfer of Software Engineering to the Classroom Environment. [Citation Graph (0, 0)][DBLP] CSEE&T, 2000, pp:15-22 [Conf]
Cesar Monroy, Rayford B. Vaughn Keeping An Educational Network Healthy: Differentiating Malicious And Naive Students On An Educational Network Environment. [Citation Graph (0, 0)][DBLP] Security and Management, 2006, pp:475-481 [Conf]
Rayford B. Vaughn Panel: Teaching Undergraduate Information Assurance. [Citation Graph (0, 0)][DBLP] World Conference on Information Security Education, 2003, pp:173-174 [Conf]
Rayford B. Vaughn Advances in the provisions of system and software security - Thirty years of progress. [Citation Graph (0, 0)][DBLP] Advances in Computers, 2003, v:58, n:, pp:288-340 [Journal]
Ambareen Siraj, Rayford B. Vaughn, Susan M. Bridges Decision Making For Network Health Assessment In An Intelligent Intrusion Detection System Architecture. [Citation Graph (0, 0)][DBLP] International Journal of Information Technology and Decision Making, 2004, v:3, n:2, pp:281-306 [Journal]
Rayford B. Vaughn Leadership by example: A perspective on the influence of Barry Boehm. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2007, v:80, n:8, pp:1222-1226 [Journal]
Efficient Update on Exploitation Graphs for Vulnerability Analysis. [Citation Graph (, )][DBLP]
Sensor Corroboration for Anomaly Sensors in an Intrusion Detection Environment. [Citation Graph (, )][DBLP]
A Discovery Learning Approach to Information Assurance Education. [Citation Graph (, )][DBLP]
Using Search Engines to Acquire Network Forensic Evidence. [Citation Graph (, )][DBLP]