James H. Graham

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

42EEEric C. Rouchka, Xiangping Wang, James H. Graham, Nigel G. F. Cooper: Computational Prediction of Genes Translationally Regulated by Cytoplasmic Polyadenylation Elements. BICoB 2009: 353-361
41 Douglas R. Wampler, James H. Graham: A Method for Detecting Windows Rootkits. Computers and Their Applications 2008: 239-243
40 Jian Guan, James H. Graham, Thomas A. Harris, Patricia A. S. Ralston: An Ontological Model for Assessing Security Risk Impact in SCADA Systems. Computers and Their Applications 2008: 264-269
39 Jeffrey L. Hieb, James H. Graham, Patricia A. S. Ralston: Testing Security Enhanced SCADA Communication Protocols. CAINE 2007: 103-108
38 Joseph F. Francom, James H. Graham: Identity Management for Advanced Health Care Systems. CAINE 2007: 307-313
37 James H. Graham, Mostafa S. Mostafa, Benjamin Arazi, Ashraf Tantawy, Jeffrey L. Hieb, Patricia A. S. Ralston, Sandip C. Patel: Improvements in SCADA and DCS Systems Security. Computers and Their Applications 2007: 194-200
36EEJeffrey L. Hieb, James H. Graham, Sandip C. Patel: Security Enhancements for Distributed Control Systems. Critical Infrastructure Protection 2007: 133-146
35 Wen-Bin Yu, James H. Graham: Demand Forecasting Using Intelligent Agents with Application to a Call Processing Center. I. J. Comput. Appl. 14(4): 201-210 (2007)
34 Sandip C. Patel, James H. Graham, Patricia A. S. Ralston: Security enhancement for SCADA communication protocols using augmented vulnerability trees. CAINE 2006: 244-251
33 Jeffrey L. Hieb, James H. Graham: Security-enhanced remote terminal units for SCADA networks. CAINE 2006: 271-276
32 Jeffrey L. Hieb, James H. Graham: Dynamic Authentication Using Keystroke Biometrics. Computers and Their Applications 2006: 337-342
31 Nathan P. Johnson, James H. Graham: An Application of Grid Computing to Pharmacophore Discovery Using Inductive Logic Programming. Computers and Their Applications 2006: 418-423
30 Sandip C. Patel, James H. Graham, Patricia A. S. Ralston, Roberto Tantalean-Carrasco: Secure SCADA Communications, Monitoring and Control over the Internet. CAINE 2005: 169-174
29 James H. Graham, Jason Walton: Event Processing Software for Intelligent Security Monitoring and Alarm System. CAINE 2005: 55-60
28EEJames H. Graham: FMECA Control for Software Development. COMPSAC (2) 2005: 93-96
27 Jeffrey L. Hieb, James H. Graham: Anomaly-Based Intrusion Monitoring Using a Dynamic Honeypot. Computers and Their Applications 2005: 184-189
26 James H. Graham, Eric Kuhl, Jonathan Nida: Agent-Based Architecture for Intelligent Semi-Autonomous Robots. Computers and Their Applications 2005: 484-487
25 Yingbing Yu, James H. Graham: Computer Immunology and Neural Network Models for Masquerader Detection. CAINE 2004: 1-6
24 Sandip C. Patel, James H. Graham: Security Considerations in DNP3 SCADA Systems. CAINE 2004: 73-78
23EEJames H. Graham, C. David Page Jr., Ahmed H. Kamal: Accelerating the Drug Design Process through Parallel Inductive Logic Programming Data Mining. CSB 2003: 400-402
22 James H. Graham, Jonathan Nida: Advanced Simulation Architecture for Intelligent Autonomous Robots. IASSE 2003: 59-62
21 Wen-Bin Yu, James H. Graham: Call Center Demand Forecasting using Intelligent Agents. IASSE 2003: 63-66
20 Ahmed H. Kamal, James H. Graham, C. David Page Jr.: A Parallel Inductive Logic Programming Data Mining System for Drug Discovery. I. J. Comput. Appl. 10(3): 161-170 (2003)
19 Essam M. Hamed, James H. Graham: Fuzzy Threat Evaluation in Computer Security. Computers and Their Applications 2002: 389-393
18 Wen-Bin Yu, James H. Graham: A Multiple Agent Architecture for Demand Forecasting in Electronic Commerce Supply Chain Systems. Computers and Their Applications 2002: 462-466
17 James H. Graham, Christopher Short, Kamalesh Gandham, Sandra McPherson, Mark Baker: Multi-level Biometric-Based Authentication System. ISCA Conference on Intelligent Systems 2002: 149-154
16 Patricia A. S. Ralston, James H. Graham, Gail W. DePuy, Chris Arnold, Sean Uhl: Intelligent Chemometrics-Based Approach for Chemical Process Fault Monitoring and Diagnosis. ISCA Conference on Intelligent Systems 2002: 91-96
15 James H. Graham, Patricia A. S. Ralston: Intelligent Computer-Based Monitoring and Fault Isolation for Industrial Processes. I. J. Comput. Appl. 9(3): 147-157 (2002)
14 Ahmed H. Kamal, James H. Graham, C. David Page Jr.: An Approach to Parallel Data Mining for Pharmacophore Discovery. ISCA Conference on Intelligent Systems 2001: 100-103
13 Essam M. Hamed, James H. Graham, Adel Said Elmaghraby: Computer Systems Threat Evaluation: An Agent-based and Fuzzy Logic Intrusion Detection Architecture. ISCA Conference on Intelligent Systems 2001: 23-26
12 Sherif A. Elfayoumy, James H. Graham: An Agent-based Architecture for Performance Tuning: Parallel Discrete-event Simulations Case Study. ISCA PDCS 2001: 401-406
11 David Page, James H. Graham: Guest Editor's Introduction. I. J. Comput. Appl. 8(2): (2001)
10 James H. Graham, Patricia A. S. Ralston: Computer-based monitoring and fault diagnosis for chemical processes. Computers and Their Applications 2000: 309-312
9EETerrence P. Fries, James H. Graham: An Agent-Based Approach to Robust Switching Between Abstraction Levels for Fault Diagnosis. SARA 2000: 303-308
8EEAdel Said Elmaghraby, Sherif A. Elfayoumy, Irfan S. Karachiwala, James H. Graham, Ahmed Z. Emam, AlaaEldin Sleem: Web-based performance visualization of distributed discrete event simulation. Winter Simulation Conference 1999: 1618-1623
7EEJames H. Graham, Irfan S. Karachiwala, Adel Said Elmaghraby: Evaluation of a Prototype Visualization for Distributed Simulations. Winter Simulation Conference 1998: 1469-1478
6 James H. Graham: Book Review. Artif. Intell. Rev. 9(6): 423 (1995)
5EEPorter Eugene Smith, James H. Graham: A Simple Balanced Search Tree. ACM Conference on Computer Science 1993: 461-465
4 James H. Graham, Jian Guan: Intelligent Diagnostics in Robotics and Integrated Manufacturing Systems. ICRA (2) 1993: 174-179
3EECarol S. Russell, Adel Said Elmaghraby, James H. Graham: An Investigation of a Standard Simulation-Knowledge Interface. Winter Simulation Conference 1992: 807-815
2 James H. Graham, Thaddeus F. Kadela: Parallel Algorithms and Architectures for Optimal State Estimation. IEEE Trans. Computers 34(11): 1061-1068 (1985)
1EEJames H. Graham, R. N. Horton: A note on determining the measure of coincidence of segments of a given conic. Computer-Aided Design 3(3): 16-17 (1971)

Coauthor Index

1Benjamin Arazi [37]
2Chris Arnold [16]
3Mark Baker [17]
4Nigel G. F. Cooper [42]
5Gail W. DePuy [16]
6Sherif A. Elfayoumy [8] [12]
7Adel Said Elmaghraby [3] [7] [8] [13]
8Ahmed Z. Emam [8]
9Joseph F. Francom [38]
10Terrence P. Fries [9]
11Kamalesh Gandham [17]
12Jian Guan [4] [40]
13Essam M. Hamed [13] [19]
14Thomas A. Harris [40]
15Jeffrey L. Hieb [27] [32] [33] [36] [37] [39]
16R. N. Horton [1]
17Nathan P. Johnson [31]
18Thaddeus F. Kadela [2]
19Ahmed H. Kamal [14] [20] [23]
20Irfan S. Karachiwala [7] [8]
21Eric Kuhl [26]
22Sandra McPherson [17]
23Mostafa S. Mostafa [37]
24Jonathan Nida [22] [26]
25C. David Page Jr. (David Page) [11] [14] [20] [23]
26Sandip C. Patel [24] [30] [34] [36] [37]
27Patricia A. S. Ralston [10] [15] [16] [30] [34] [37] [39] [40]
28Eric C. Rouchka [42]
29Carol S. Russell [3]
30Christopher Short [17]
31AlaaEldin Sleem [8]
32Porter Eugene Smith [5]
33Roberto Tantalean-Carrasco [30]
34Ashraf Tantawy [37]
35Sean Uhl [16]
36Jason Walton [29]
37Douglas R. Wampler [41]
38Xiangping Wang [42]
39Wen-Bin Yu [18] [21] [35]
40Yingbing Yu [25]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)