Search Results - "Miles McQueen"

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Smart Grid Data Integrity Attacks by Giani, Annarita, Bitar, Eilyan, Garcia, Manuel, McQueen, Miles, Khargonekar, Pramod, Poolla, Kameshwar

    Published in IEEE transactions on smart grid (01-09-2013)
    “…Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored and transmitted over a SCADA…”
    Get full text
    Journal Article
  2. 2

    Information gain based dimensionality selection for classifying text documents by Wijayasekara, Dumidu, Manic, Milos, McQueen, Miles

    “…Selecting the optimal dimensions for various knowledge extraction applications is an essential component of data mining. Dimensionality selection techniques…”
    Get full text
    Conference Proceeding
  3. 3

    Mining Bug Databases for Unidentified Software Vulnerabilities by Wijayasekara, D., Manic, M., Wright, J. L., McQueen, M.

    “…Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been…”
    Get full text
    Conference Proceeding
  4. 4

    Vulnerability identification and classification via text mining bug databases by Wijayasekara, Dumidu, Manic, Milos, McQueen, Miles

    “…As critical and sensitive systems increasingly rely on complex software systems, identifying software vulnerabilities is becoming increasingly important. It…”
    Get full text
    Conference Proceeding
  5. 5

    Software and human vulnerabilities by McQueen, Miles

    “…The collection of slides covered the following topics: power grid system; substation data; software vulnerability; human vulnerability; risk analysis; control…”
    Get full text
    Conference Proceeding
  6. 6

    Are Vulnerability Disclosure Deadlines Justified? by McQueen, M., Wright, J. L., Wellman, L.

    “…Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of…”
    Get full text
    Conference Proceeding
  7. 7

    Empirical Estimates and Observations of 0Day Vulnerabilities by McQueen, M.A., McQueen, T.A., Boyer, W.F., Chaffin, M.R.

    “…We define a 0Day vulnerability to be any vulnerability, in deployed software, that has been discovered by at least one person but has not yet been publicly…”
    Get full text
    Conference Proceeding
  8. 8

    RNEDE: Resilient network design environment by Venkatasubramanian, Venkat, Malik, Tanu, Giridhar, Arun, Villez, Kris, Prasad, Raghvendra, Shukla, Aviral, Rieger, Craig, Daum, Keith, McQueen, Miles

    “…Modern living is more and more dependent on the intricate web of critical infrastructure systems. The failure or damage of such systems can cause huge…”
    Get full text
    Conference Proceeding
  9. 9

    Metrics for assessment of smart grid data integrity attacks by Giani, A., Bent, R., Hinrichs, M., McQueen, M., Poolla, K.

    “…There is an emerging consensus that the nation's electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on…”
    Get full text
    Conference Proceeding
  10. 10

    Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System by McQueen, M.A., Boyer, W.F., Flynn, M.A., Beitel, G.A.

    “…We propose a new methodology for obtaining a quantitative measurement of the risk reduction achieved when a control system is modified with the intent to…”
    Get full text
    Conference Proceeding
  11. 11

    Resilient control systems: Next generation design research by Rieger, C.G., Gertman, D.I., McQueen, M.A.

    “…Since digital control systems were introduced to the market more than 30 years ago, the operational efficiency and stability gained through their use have…”
    Get full text
    Conference Proceeding
  12. 12

    Analyses of Two End-User Software Vulnerability Ex by Jason L. Wright, Miles McQueen, Lawrence Wellman

    Published in Information security technical report (01-05-2013)
    “…Understanding the exposure risk because of softwar…”
    Get full text
    Journal Article
  13. 13

    Optimal placement of Phasor Measurement Units in power grids using Memetic Algorithms by Linda, Ondrej, Wijayasekara, Dumidu, Manic, Milos, McQueen, Miles

    “…Wide area monitoring, protection and control for power network systems are one of the fundamental components of the smart grid concept. Synchronized…”
    Get full text
    Conference Proceeding
  14. 14

    Analyses of two end-user software vulnerability exposure metrics (extended version) by L. Wright, Jason, McQueen, Miles, Wellman, Lawrence

    Published in Information security technical report (01-05-2013)
    “…Understanding the exposure risk of software vulnerabilities is an important part of the software ecosystem. Reliable software vulnerability metrics allow…”
    Get full text
    Journal Article
  15. 15

    Estimating Software Vulnerabilities: A Case Study Based on the Misclassification of Bugs in MySQL Server by Wright, Jason L., Larsen, Jason W., McQueen, Miles

    “…Software vulnerabilities are an important part of the modern software economy. Being able to accurately classify software defects as a vulnerability, or not,…”
    Get full text
    Conference Proceeding
  16. 16

    Multi-criteria based staging of Optimal PMU Placement using Fuzzy Weighted Average by Linda, Ondrej, Manic, Milos, Giani, Annarita, McQueen, Miles

    “…In this paper, a multi-criteria based two step method for Optimal PMU Placement (OPP) using Fuzzy Weighted Average (FWA) is proposed. In the first step, a…”
    Get full text
    Conference Proceeding
  17. 17

    Deception used for cyber defense of control systems by McQueen, M.A., Boyer, W.F.

    “…Control system cyber security defense mechanisms may employ deception in human system interactions to make it more difficult for attackers to plan and execute…”
    Get full text
    Conference Proceeding
  18. 18

    A temporal-spatial data fusion architecture for monitoring complex systems by McCarty, Kevin, Manic, Milos, Cherry, Shane, McQueen, Miles

    “…Non-homogenous systems arise from the need to incorporate a variety of disparate systems into a cohesive functioning whole and may comprise many crucial…”
    Get full text
    Conference Proceeding
  19. 19

    Analyses of Two End-User Software Vulnerability Exposure Metrics by Wright, J. L., McQueen, M., Wellman, L.

    “…The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of…”
    Get full text
    Conference Proceeding