Scott L. Graham
6105  Ergebnisse:
Personensuche X
?
 
?
 
?
4

Effects of dairy farming management practices on carbon bal..:

Wall, Aaron M. ; Laubach, Johannes ; Campbell, David I....
Agriculture, Ecosystems & Environment.  367 (2024)  - p. 108962 , 2024
 
?
5

Demonstrating Redundancy Advantages of a Three-Channel Comm..:

Culbreth, Scott ; Graham, Scott
International Conference on Cyber Warfare and Security.  18 (2023)  1 - p. 513-522 , 2023
 
?
7

Transparency to Visibility (T2V): Network Visualization in ..:

Graham, Scott ; Majdik, Zoltan ; Clark, Dave
Unbound: A Journal of Digital Scholarship.  2 (2023)  1 - p. 14-24 , 2023
 
?
8

IronNetInjector: Weaponizing .NET Dynamic Language Runtime ..:

Rose, Anthony ; Graham, Scott ; Krasnov, Jacob
Digital Threats: Research and Practice.  4 (2023)  3 - p. 1-23 , 2023
 
?
9

Mitigation potential and trade-offs for nitrous oxide emiss..:

Laubach, Johannes ; Hunt, John E. ; Graham, Scott L....
Agricultural and Forest Meteorology.  330 (2023)  - p. 109310 , 2023
 
?
10

Transforming Defense Capabilities 

New Approaches for International Security 
 
?
11

InfiniBand Network Monitoring: Challenges and Possibilities:

, In: Critical Infrastructure Protection XV; IFIP Advances in Information and Communication Technology,
Hintze, Kyle ; Graham, Scott ; Dunlap, Stephen. - p. 187-208 , 2022
 
?
12

Probability of Data Leakage and Its Impacts on Confidential..:

Simon, Paul ; Graham, Scott
European Conference on Cyber Warfare and Security.  21 (2022)  1 - p. 280-288 , 2022
 
?
13

A metric for quantifying nonlinearity in k-dimensional comp..:

Llewellyn, Larry C ; Grimaila, Michael R ; Hodson, Douglas D.
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology.  21 (2022)  1 - p. 5-15 , 2022
 
?
14

Anomaly Detection in Automation Controllers:

, In: Critical Infrastructure Protection XV; IFIP Advances in Information and Communication Technology,
 
?
15

EVALUATING THE USE OF BOOT IMAGE ENCRYPTION ON THE TALOS II..:

, In: Critical Infrastructure Protection XVI; IFIP Advances in Information and Communication Technology,
 
1-15
Mehr Literatur finden