The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Rayford B. Vaughn: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Blaine Burnham, Cynthia E. Irvine, Charles Reynolds, Ravi S. Sandhu, Rayford B. Vaughn
    Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum). [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:265-0 [Conf]
  2. Wei Li, Rayford B. Vaughn
    Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2006, pp:26- [Conf]
  3. Gregory W. Hislop, Michael J. Lutz, Rayford B. Vaughn, David A. Umphress
    Panel 1: Changing Conditions for Undergraduate Software Engineering Programs. [Citation Graph (0, 0)][DBLP]
    CSEE&T, 2002, pp:250-251 [Conf]
  4. Rayford B. Vaughn
    A Report on Industrial Transfer of Software Engineering to the Classroom Environment. [Citation Graph (0, 0)][DBLP]
    CSEE&T, 2000, pp:15-22 [Conf]
  5. Cesar Monroy, Rayford B. Vaughn
    Keeping An Educational Network Healthy: Differentiating Malicious And Naive Students On An Educational Network Environment. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:475-481 [Conf]
  6. Wei Li, Rayford B. Vaughn
    Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  7. Robert McGrew, Rayford B. Vaughn
    Experiences with Honeypot Systems: Development, Deployment, and Analysis. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  8. Ambareen Siraj, Rayford B. Vaughn, Susan Bridges
    Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  9. Rayford B. Vaughn, Ronda R. Henning, Ambareen Siraj
    Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy. [Citation Graph (0, 0)][DBLP]
    HICSS, 2003, pp:331- [Conf]
  10. Rayford B. Vaughn, David A. Dampier
    Digital Forensics--State of the Science and Foundational Research Activity. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:263- [Conf]
  11. Craig M. McRae, Rayford B. Vaughn
    Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:270- [Conf]
  12. Rayford B. Vaughn, David A. Dampier
    The Development of a University-Based Forensics Training Center as a Regional Outreach and Service Activity. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:265- [Conf]
  13. Rayford B. Vaughn
    Panel: Teaching Undergraduate Information Assurance. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:173-174 [Conf]
  14. Ambareen Siraj, Rayford B. Vaughn
    A Cognitive Model for Alert Correlation in a Distributed Environment. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:218-230 [Conf]
  15. German Florez-Larrahondo, Susan M. Bridges, Rayford B. Vaughn
    Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:506-514 [Conf]
  16. German Florez, Zhen Liu, Susan Bridges, Rayford B. Vaughn, Anthony Skjellum
    Detecting Anomalies in High-Performance Parallel Programs. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:30-34 [Conf]
  17. Zhen Liu, Susan M. Bridges, Rayford B. Vaughn
    Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:164-177 [Conf]
  18. Byron Williams, Jeffrey Carver, Rayford B. Vaughn
    Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements. [Citation Graph (0, 0)][DBLP]
    Software Engineering Research and Practice, 2006, pp:966-971 [Conf]
  19. Rayford B. Vaughn
    Application of security tot he computing science classroom. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2000, pp:90-94 [Conf]
  20. Rayford B. Vaughn
    Advances in the provisions of system and software security - Thirty years of progress. [Citation Graph (0, 0)][DBLP]
    Advances in Computers, 2003, v:58, n:, pp:288-340 [Journal]
  21. Rayford B. Vaughn, Hossein Saiedian, Elizabeth A. Unger
    A Proposed Mechanism for Implementation of Non-Discretionary Access Controls in a Network Environment. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1994, v:26, n:12, pp:1523-1531 [Journal]
  22. Rayford B. Vaughn, Hossein Saiedian, Elizabeth A. Unger
    A survey of security issues in office computation and the application of secure computing models to office systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:1, pp:79-97 [Journal]
  23. German Florez, Zhen Liu, Susan M. Bridges, Anthony Skjellum, Rayford B. Vaughn
    Lightweight monitoring of MPI programs in real time. [Citation Graph (0, 0)][DBLP]
    Concurrency and Computation: Practice and Experience, 2005, v:17, n:13, pp:1547-1578 [Journal]
  24. Ambareen Siraj, Rayford B. Vaughn, Susan M. Bridges
    Decision Making For Network Health Assessment In An Intelligent Intrusion Detection System Architecture. [Citation Graph (0, 0)][DBLP]
    International Journal of Information Technology and Decision Making, 2004, v:3, n:2, pp:281-306 [Journal]
  25. Udai Kumar Kudikyala, Rayford B. Vaughn
    Software requirement understanding using Pathfinder networks: discovering and evaluating mental models. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:74, n:1, pp:101-108 [Journal]
  26. Rayford B. Vaughn, Julian E. Boggess III
    Integration of computer security into the software engineering and computer science programs. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1999, v:49, n:2-3, pp:149-153 [Journal]
  27. Rayford B. Vaughn, Ronda R. Henning, Kevin L. Fox
    An empirical study of industrial security-engineering practices. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2002, v:61, n:3, pp:225-232 [Journal]
  28. Rayford B. Vaughn
    Leadership by example: A perspective on the influence of Barry Boehm. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:8, pp:1222-1226 [Journal]

  29. Efficient Update on Exploitation Graphs for Vulnerability Analysis. [Citation Graph (, )][DBLP]


  30. Sensor Corroboration for Anomaly Sensors in an Intrusion Detection Environment. [Citation Graph (, )][DBLP]


  31. A Discovery Learning Approach to Information Assurance Education. [Citation Graph (, )][DBLP]


  32. Using Search Engines to Acquire Network Forensic Evidence. [Citation Graph (, )][DBLP]


  33. Time Analysis of Hard Drive Imaging Tools. [Citation Graph (, )][DBLP]


  34. Information system security compliance to FISMA standard: A quantitative measure. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002