John Hale
TitleCited byYear
Learning to coordinate without sharing information
S Sen, M Sekaran, J Hale
AAAI 94, 426-431, 1994
4321994
Modeling internet attacks
T Tidwell, R Larson, K Fitch, J Hale
Proceedings of the 2001 IEEE Workshop on Information Assurance and security 59, 2001
2152001
Method to inhibit the identification and retrieval of proprietary media via automated search engines utilized in association with computer compatible communications network
JC Hale, GW Manes
US Patent 6,732,180, 2004
1552004
A systematic approach to multi-stage network attack analysis
J Dawkins, J Hale
Second IEEE International Information Assurance Workshop, 2004. Proceedings …, 2004
1262004
Modeling network attacks: Extending the attack tree paradigm
J Dawkins, C Campbell, J Hale
Workshop on Statistical and Machine Learning Techniques in Computer …, 2002
902002
Securing ss7 telecommunications networks
G Lorenz, T Moore, G Manes, J Hale, S Shenoi
Workshop on Information Assurance and Security 2, 1115, 2001
512001
A genetic algorithm for fragment allocation in a distributed database system
AL Corcoran, J Hale
Proceedings of the 1994 ACM symposium on Applied computing, 247-250, 1994
501994
Analyzing FD inference in relational databases
J Hale, S Shenoi
Data & Knowledge Engineering 18 (2), 167-183, 1996
381996
Qualitative and quantitative analytical techniques for network security assessment
K Clark, S Tyree, J Dawkins, J Hale
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004
352004
Security policy coordination for heterogeneous information systems
J Hale, P Galiasso, M Papa, S Shenoi
Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99 …, 1999
331999
Catalytic inference analysis: Detecting inference threats due to knowledge discovery
J Hale, S Shenoi
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
331997
A contextualized model for cross-cultural leadership in West Africa
JR Hale
Proceedings of the Servant Leadership Research Roundtable, 1-25, 2004
282004
Compliance method for a cyber-physical system
JC Hale, PJ Hawrylak, MJ Papa
US Patent 10,185,833, 2019
272019
Using hybrid attack graphs to model cyber-physical attacks in the Smart Grid
PJ Hawrylak, M Haney, M Papa, J Hale
2012 5th International Symposium on Resilient Control Systems, 161-164, 2012
252012
Secur (e/ity) management: A continuing uphill climb
J Hale, P Brusil
Journal of Network and Systems Management 15 (4), 525-553, 2007
242007
Security risk metrics: Fusing enterprise objectives and vulnerabilities
K Clark, J Dawkins, J Hale
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop …, 2005
242005
A framework for high assurance security of distributed objects
J Hale, J Threet, S Shenoi
Database Security, 101-119, 1997
241997
Packet sniffing for automated chat room monitoring and evidence preservation
A Meehan, G Manes, L Davis, J Hale, S Shenoi
Workshop on Information Assurance and Security 2, 1045, 2001
232001
Security risks associated with radio frequency identification in medical environments
PJ Hawrylak, N Schimke, J Hale, M Papa
Journal of medical systems 36 (6), 3491-3505, 2012
222012
Formal analysis of e-commerce protocols
M Papa, O Bremer, J Hale, S Shenoi
IEICE TRANSACTIONS on Information and Systems 84 (10), 1313-1323, 2001
222001
The system can't perform the operation now. Try again later.
Articles 1–20