Rayford B. Vaughn

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

35EERayford B. Vaughn, David A. Dampier: A Discovery Learning Approach to Information Assurance Education. HICSS 2009: 1-9
34EEJack Wesley Riley, David A. Dampier, Rayford B. Vaughn: Time Analysis of Hard Drive Imaging Tools. IFIP Int. Conf. Digital Forensics 2008: 335-344
33EEJack Wesley Riley, David A. Dampier, Rayford B. Vaughn: A Comparison of Forensic Hard Drive Imagers: A Time Analysis Comparison Between the ICS Image MASSter-Solo III and the Logicube Talon. J. Digital Forensic Practice 2(2): 74-82 (2008)
32 Ambareen Siraj, Rayford B. Vaughn: Sensor Corroboration for Anomaly Sensors in an Intrusion Detection Environment. CAINE 2007: 278-283
31 Wei Li, Rayford B. Vaughn: Efficient Update on Exploitation Graphs for Vulnerability Analysis. CAINE 2007: 295-300
30EERayford B. Vaughn, David A. Dampier: Digital Forensics--State of the Science and Foundational Research Activity. HICSS 2007: 263
29EERayford B. Vaughn, David A. Dampier: The Development of a University-Based Forensics Training Center as a Regional Outreach and Service Activity. HICSS 2007: 265
28EECraig M. McRae, Rayford B. Vaughn: Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks. HICSS 2007: 270
27EERobert McGrew, Rayford B. Vaughn: Using Search Engines to Acquire Network Forensic Evidence. IFIP Int. Conf. Digital Forensics 2007: 247-253
26EERayford B. Vaughn: Leadership by example: A perspective on the influence of Barry Boehm. Journal of Systems and Software 80(8): 1222-1226 (2007)
25EEWei Li, Rayford B. Vaughn: Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs. CCGRID 2006: 26
24EERobert McGrew, Rayford B. Vaughn: Experiences with Honeypot Systems: Development, Deployment, and Analysis. HICSS 2006
23EEWei Li, Rayford B. Vaughn: Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering. HICSS 2006
22 Cesar Monroy, Rayford B. Vaughn: Keeping An Educational Network Healthy: Differentiating Malicious And Naive Students On An Educational Network Environment. Security and Management 2006: 475-481
21 Byron J. Williams, Jeffrey Carver, Rayford B. Vaughn: Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements. Software Engineering Research and Practice 2006: 966-971
20EECraig M. McRae, Robert Wesley McGrew, Rayford B. Vaughn: Honey Tokens and Web Bugs: Developing Reactive Techniques for Investigating Phishing Scams. J. Digital Forensic Practice 1(3): 193-199 (2006)
19EEGerman Florez-Larrahondo, Susan M. Bridges, Rayford B. Vaughn: Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models. ISC 2005: 506-514
18EEAmbareen Siraj, Rayford B. Vaughn: A Cognitive Model for Alert Correlation in a Distributed Environment. ISI 2005: 218-230
17 Zhen Liu, Susan M. Bridges, Rayford B. Vaughn: Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models. IWIA 2005: 164-177
16EEGerman Florez, Zhen Liu, Susan M. Bridges, Anthony Skjellum, Rayford B. Vaughn: Lightweight monitoring of MPI programs in real time. Concurrency and Computation: Practice and Experience 17(13): 1547-1578 (2005)
15EEUdai Kumar Kudikyala, Rayford B. Vaughn: Software requirement understanding using Pathfinder networks: discovering and evaluating mental models. Journal of Systems and Software 74(1): 101-108 (2005)
14EEAmbareen Siraj, Rayford B. Vaughn, Susan Bridges: Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture. HICSS 2004
13EEGerman Florez, Zhen Liu, Susan Bridges, Rayford B. Vaughn, Anthony Skjellum: Detecting Anomalies in High-Performance Parallel Programs. ITCC (2) 2004: 30-34
12EEAmbareen Siraj, Rayford B. Vaughn, Susan M. Bridges: Decision Making For Network Health Assessment In An Intelligent Intrusion Detection System Architecture. International Journal of Information Technology and Decision Making 3(2): 281-306 (2004)
11EERayford B. Vaughn, Ronda R. Henning, Ambareen Siraj: Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy. HICSS 2003: 331
10 Rayford B. Vaughn: Panel: Teaching Undergraduate Information Assurance. World Conference on Information Security Education 2003: 173-174
9 Rayford B. Vaughn: Advances in the provisions of system and software security - Thirty years of progress. Advances in Computers 58: 288-340 (2003)
8EEGregory W. Hislop, Michael J. Lutz, Rayford B. Vaughn, David A. Umphress: Panel 1: Changing Conditions for Undergraduate Software Engineering Programs. CSEE&T 2002: 250-251
7EERayford B. Vaughn, Ronda R. Henning, Kevin L. Fox: An empirical study of industrial security-engineering practices. Journal of Systems and Software 61(3): 225-232 (2002)
6EERayford B. Vaughn: A Report on Industrial Transfer of Software Engineering to the Classroom Environment. CSEE&T 2000: 15-22
5EERayford B. Vaughn: Application of security tot he computing science classroom. SIGCSE 2000: 90-94
4EEBlaine Burnham, Cynthia E. Irvine, Charles Reynolds, Ravi S. Sandhu, Rayford B. Vaughn: Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum). ACSAC 1999: 265-
3EERayford B. Vaughn, Julian E. Boggess III: Integration of computer security into the software engineering and computer science programs. Journal of Systems and Software 49(2-3): 149-153 (1999)
2 Rayford B. Vaughn, Hossein Saiedian, Elizabeth A. Unger: A Proposed Mechanism for Implementation of Non-Discretionary Access Controls in a Network Environment. Computer Networks and ISDN Systems 26(12): 1523-1531 (1994)
1EERayford B. Vaughn, Hossein Saiedian, Elizabeth A. Unger: A survey of security issues in office computation and the application of secure computing models to office systems. Computers & Security 12(1): 79-97 (1993)

Coauthor Index

1Julian E. Boggess III [3]
2Susan M. Bridges (Susan Bridges) [12] [13] [14] [16] [17] [19]
3Blaine Burnham [4]
4Jeffrey C. Carver (Jeffrey Carver) [21]
5David A. Dampier [29] [30] [33] [34] [35]
6German Florez [13] [16]
7German Florez-Larrahondo [19]
8Kevin L. Fox [7]
9Ronda R. Henning [7] [11]
10Gregory W. Hislop [8]
11Cynthia E. Irvine [4]
12Udai Kumar Kudikyala [15]
13Wei Li [23] [25] [31]
14Zhen Liu [13] [16] [17]
15Michael J. Lutz [8]
16Robert Wesley McGrew [20]
17Robert McGrew [24] [27]
18Craig M. McRae [20] [28]
19Cesar Monroy [22]
20Charles Reynolds [4]
21Jack Wesley Riley [33] [34]
22Hossein Saiedian [1] [2]
23Ravi S. Sandhu [4]
24Ambareen Siraj [11] [12] [14] [18] [32]
25Anthony Skjellum [13] [16]
26David A. Umphress [8]
27Elizabeth A. Unger [1] [2]
28Byron J. Williams [21]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)