2009 |
35 | EE | Rayford B. Vaughn,
David A. Dampier:
A Discovery Learning Approach to Information Assurance Education.
HICSS 2009: 1-9 |
2008 |
34 | EE | Jack Wesley Riley,
David A. Dampier,
Rayford B. Vaughn:
Time Analysis of Hard Drive Imaging Tools.
IFIP Int. Conf. Digital Forensics 2008: 335-344 |
33 | EE | Jack Wesley Riley,
David A. Dampier,
Rayford B. Vaughn:
A Comparison of Forensic Hard Drive Imagers: A Time Analysis Comparison Between the ICS Image MASSter-Solo III and the Logicube Talon.
J. Digital Forensic Practice 2(2): 74-82 (2008) |
2007 |
32 | | Ambareen Siraj,
Rayford B. Vaughn:
Sensor Corroboration for Anomaly Sensors in an Intrusion Detection Environment.
CAINE 2007: 278-283 |
31 | | Wei Li,
Rayford B. Vaughn:
Efficient Update on Exploitation Graphs for Vulnerability Analysis.
CAINE 2007: 295-300 |
30 | EE | Rayford B. Vaughn,
David A. Dampier:
Digital Forensics--State of the Science and Foundational Research Activity.
HICSS 2007: 263 |
29 | EE | Rayford B. Vaughn,
David A. Dampier:
The Development of a University-Based Forensics Training Center as a Regional Outreach and Service Activity.
HICSS 2007: 265 |
28 | EE | Craig M. McRae,
Rayford B. Vaughn:
Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks.
HICSS 2007: 270 |
27 | EE | Robert McGrew,
Rayford B. Vaughn:
Using Search Engines to Acquire Network Forensic Evidence.
IFIP Int. Conf. Digital Forensics 2007: 247-253 |
26 | EE | Rayford B. Vaughn:
Leadership by example: A perspective on the influence of Barry Boehm.
Journal of Systems and Software 80(8): 1222-1226 (2007) |
2006 |
25 | EE | Wei Li,
Rayford B. Vaughn:
Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs.
CCGRID 2006: 26 |
24 | EE | Robert McGrew,
Rayford B. Vaughn:
Experiences with Honeypot Systems: Development, Deployment, and Analysis.
HICSS 2006 |
23 | EE | Wei Li,
Rayford B. Vaughn:
Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering.
HICSS 2006 |
22 | | Cesar Monroy,
Rayford B. Vaughn:
Keeping An Educational Network Healthy: Differentiating Malicious And Naive Students On An Educational Network Environment.
Security and Management 2006: 475-481 |
21 | | Byron J. Williams,
Jeffrey Carver,
Rayford B. Vaughn:
Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements.
Software Engineering Research and Practice 2006: 966-971 |
20 | EE | Craig M. McRae,
Robert Wesley McGrew,
Rayford B. Vaughn:
Honey Tokens and Web Bugs: Developing Reactive Techniques for Investigating Phishing Scams.
J. Digital Forensic Practice 1(3): 193-199 (2006) |
2005 |
19 | EE | German Florez-Larrahondo,
Susan M. Bridges,
Rayford B. Vaughn:
Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models.
ISC 2005: 506-514 |
18 | EE | Ambareen Siraj,
Rayford B. Vaughn:
A Cognitive Model for Alert Correlation in a Distributed Environment.
ISI 2005: 218-230 |
17 | | Zhen Liu,
Susan M. Bridges,
Rayford B. Vaughn:
Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models.
IWIA 2005: 164-177 |
16 | EE | German Florez,
Zhen Liu,
Susan M. Bridges,
Anthony Skjellum,
Rayford B. Vaughn:
Lightweight monitoring of MPI programs in real time.
Concurrency and Computation: Practice and Experience 17(13): 1547-1578 (2005) |
15 | EE | Udai Kumar Kudikyala,
Rayford B. Vaughn:
Software requirement understanding using Pathfinder networks: discovering and evaluating mental models.
Journal of Systems and Software 74(1): 101-108 (2005) |
2004 |
14 | EE | Ambareen Siraj,
Rayford B. Vaughn,
Susan Bridges:
Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture.
HICSS 2004 |
13 | EE | German Florez,
Zhen Liu,
Susan Bridges,
Rayford B. Vaughn,
Anthony Skjellum:
Detecting Anomalies in High-Performance Parallel Programs.
ITCC (2) 2004: 30-34 |
12 | EE | Ambareen Siraj,
Rayford B. Vaughn,
Susan M. Bridges:
Decision Making For Network Health Assessment In An Intelligent Intrusion Detection System Architecture.
International Journal of Information Technology and Decision Making 3(2): 281-306 (2004) |
2003 |
11 | EE | Rayford B. Vaughn,
Ronda R. Henning,
Ambareen Siraj:
Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy.
HICSS 2003: 331 |
10 | | Rayford B. Vaughn:
Panel: Teaching Undergraduate Information Assurance.
World Conference on Information Security Education 2003: 173-174 |
9 | | Rayford B. Vaughn:
Advances in the provisions of system and software security - Thirty years of progress.
Advances in Computers 58: 288-340 (2003) |
2002 |
8 | EE | Gregory W. Hislop,
Michael J. Lutz,
Rayford B. Vaughn,
David A. Umphress:
Panel 1: Changing Conditions for Undergraduate Software Engineering Programs.
CSEE&T 2002: 250-251 |
7 | EE | Rayford B. Vaughn,
Ronda R. Henning,
Kevin L. Fox:
An empirical study of industrial security-engineering practices.
Journal of Systems and Software 61(3): 225-232 (2002) |
2000 |
6 | EE | Rayford B. Vaughn:
A Report on Industrial Transfer of Software Engineering to the Classroom Environment.
CSEE&T 2000: 15-22 |
5 | EE | Rayford B. Vaughn:
Application of security tot he computing science classroom.
SIGCSE 2000: 90-94 |
1999 |
4 | EE | Blaine Burnham,
Cynthia E. Irvine,
Charles Reynolds,
Ravi S. Sandhu,
Rayford B. Vaughn:
Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum).
ACSAC 1999: 265- |
3 | EE | Rayford B. Vaughn,
Julian E. Boggess III:
Integration of computer security into the software engineering and computer science programs.
Journal of Systems and Software 49(2-3): 149-153 (1999) |
1994 |
2 | | Rayford B. Vaughn,
Hossein Saiedian,
Elizabeth A. Unger:
A Proposed Mechanism for Implementation of Non-Discretionary Access Controls in a Network Environment.
Computer Networks and ISDN Systems 26(12): 1523-1531 (1994) |
1993 |
1 | EE | Rayford B. Vaughn,
Hossein Saiedian,
Elizabeth A. Unger:
A survey of security issues in office computation and the application of secure computing models to office systems.
Computers & Security 12(1): 79-97 (1993) |