Follow
George Louthan
George Louthan
University of Oklahoma
Verified email at savetheband.net - Homepage
Title
Cited by
Cited by
Year
Hybrid extensions for stateful attack graphs
G Louthan, M Haney, P Hardwicke, P Hawrylak, J Hale
Proceedings of the 9th Annual Cyber and Information Security Research …, 2014
202014
Toward hybrid attack dependency graphs
G Louthan, P Hardwicke, P Hawrylak, J Hale
Proceedings of the Seventh Annual Workshop on Cyber Security and Information …, 2011
152011
Hybrid attack graphs for modeling cyber-physical systems
GR Louthan IV
University of Tulsa, 2011
122011
The blunderdome: an offensive exercise for building network, systems, and web security awareness
G Louthan, W Roberts, M Butler, J Hale
3rd Workshop on Cyber Security Experimentation and Test (CSET 10), 2010
112010
The OneOklahoma friction free network: towards a multi-institutional science DMZ in an EPSCoR State
H Neeman, D Akin, J Alexander, D Brunson, SP Calhoun, J Deaton, ...
Proceedings of the 2014 Annual Conference on Extreme Science and Engineering …, 2014
102014
Techniques for attack graph visualization and interaction
Z Harbort, G Louthan, J Hale
Proceedings of the Seventh Annual Workshop on Cyber Security and Information …, 2011
72011
Attack graphs and scenario driven wireless computer network defense
PJ Hawrylak, G Louthan, J Daily, J Hal, M Papa
Situational awareness in computer network defense: Principles, methods and …, 2012
62012
Practical cyber-security solutions for the science dmz
PJ Hawrylak, G Louthan, J Hale, M Papa
Proceedings of the Practice and Experience in Advanced Research Computing on …, 2019
42019
Toward sensitive information redaction in a collaborative, multilevel security environment
P Gehres, N Singleton, G Louthan, J Hale
Proceedings of the 6th International Symposium on Wikis and Open …, 2010
42010
Content-based alternatives to conventional network monitoring systems
G Louthan, B Deetz, M Walker, J Hale
Proceedings of the 5th Annual Workshop on Cyber Security and Information …, 2009
32009
On fostering a culture of research cyberinfrastructure grant proposals within a community of service providers in an EPSCoR state
H Neeman, K Adams, J Alexander, D Brunson, SP Calhoun, J Deaton, ...
Proceedings of the 2015 XSEDE Conference: Scientific Advancements Enabled by …, 2015
22015
Toward Robust and Extensible Automatic Protocol Identification.
G Louthan, C McMillan, C Johnson, J Hale
International Conference on Internet Computing, 104-108, 2009
12009
The OneOklahoma Cyberinfrastructure Initiative: A Model for Multi-institutional Collaboration
H Neeman, D Brunson, N Xiong, H Severini, M Morris, F Fondjo Fotou, ...
2016
SAND: An Architecture for Signature-based Automatic Network Protocol Detection (Poster)
G Louthan, J Hale
18th USENIX Security Symposium, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–14