Hybrid extensions for stateful attack graphs G Louthan, M Haney, P Hardwicke, P Hawrylak, J Hale Proceedings of the 9th Annual Cyber and Information Security Research …, 2014 | 20 | 2014 |
Toward hybrid attack dependency graphs G Louthan, P Hardwicke, P Hawrylak, J Hale Proceedings of the Seventh Annual Workshop on Cyber Security and Information …, 2011 | 15 | 2011 |
Hybrid attack graphs for modeling cyber-physical systems GR Louthan IV University of Tulsa, 2011 | 12 | 2011 |
The blunderdome: an offensive exercise for building network, systems, and web security awareness G Louthan, W Roberts, M Butler, J Hale 3rd Workshop on Cyber Security Experimentation and Test (CSET 10), 2010 | 11 | 2010 |
The OneOklahoma friction free network: towards a multi-institutional science DMZ in an EPSCoR State H Neeman, D Akin, J Alexander, D Brunson, SP Calhoun, J Deaton, ... Proceedings of the 2014 Annual Conference on Extreme Science and Engineering …, 2014 | 10 | 2014 |
Techniques for attack graph visualization and interaction Z Harbort, G Louthan, J Hale Proceedings of the Seventh Annual Workshop on Cyber Security and Information …, 2011 | 7 | 2011 |
Attack graphs and scenario driven wireless computer network defense PJ Hawrylak, G Louthan, J Daily, J Hal, M Papa Situational awareness in computer network defense: Principles, methods and …, 2012 | 6 | 2012 |
Practical cyber-security solutions for the science dmz PJ Hawrylak, G Louthan, J Hale, M Papa Proceedings of the Practice and Experience in Advanced Research Computing on …, 2019 | 4 | 2019 |
Toward sensitive information redaction in a collaborative, multilevel security environment P Gehres, N Singleton, G Louthan, J Hale Proceedings of the 6th International Symposium on Wikis and Open …, 2010 | 4 | 2010 |
Content-based alternatives to conventional network monitoring systems G Louthan, B Deetz, M Walker, J Hale Proceedings of the 5th Annual Workshop on Cyber Security and Information …, 2009 | 3 | 2009 |
On fostering a culture of research cyberinfrastructure grant proposals within a community of service providers in an EPSCoR state H Neeman, K Adams, J Alexander, D Brunson, SP Calhoun, J Deaton, ... Proceedings of the 2015 XSEDE Conference: Scientific Advancements Enabled by …, 2015 | 2 | 2015 |
Toward Robust and Extensible Automatic Protocol Identification. G Louthan, C McMillan, C Johnson, J Hale International Conference on Internet Computing, 104-108, 2009 | 1 | 2009 |
The OneOklahoma Cyberinfrastructure Initiative: A Model for Multi-institutional Collaboration H Neeman, D Brunson, N Xiong, H Severini, M Morris, F Fondjo Fotou, ... | | 2016 |
SAND: An Architecture for Signature-based Automatic Network Protocol Detection (Poster) G Louthan, J Hale 18th USENIX Security Symposium, 2009 | | 2009 |