Shrobe, Howard
52  results:
Search for persons X
?
1

TAG: Tagged Architecture Guide:

Jero, Samuel ; Burow, Nathan ; Ward, Bryan...
ACM Computing Surveys.  55 (2022)  6 - p. 1-34 , 2022
 
?
2

Keeping Safe Rust Safe with Galeed:

, In: Annual Computer Security Applications Conference,
 
?
3

One Giant Leap for Computer Security:

Okhravi, Hamed ; Burow, Nathan ; Skowyra, Richard...
IEEE Security & Privacy.  18 (2020)  4 - p. 8-19 , 2020
 
?
4

Moving Target Defense Considerations in Real-Time Safety- a..:

, In: Proceedings of the 7th ACM Workshop on Moving Target Defense,
Burow, Nathan ; Burrow, Ryan ; Khazan, Roger.. - p. 81-89 , 2020
 
?
5

Rigorous Machine Learning for Secure and Autonomous Cyber P..:

, In: 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA),
 
?
6

FirmFuzz : Automated IoT Firmware Introspection and Anal..:

, In: Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things,
Srivastava, Prashast ; Peng, Hui ; Li, Jiahao... - p. 15-21 , 2019
 
?
9

IIoT Cybersecurity Risk Modeling for SCADA Systems:

Falco, Gregory ; Caldera, Carlos ; Shrobe, Howard
IEEE Internet of Things Journal.  5 (2018)  6 - p. 4486-4495 , 2018
 
?
12

Automated vulnerability analysis of AC state estimation und..:

, In: 2015 54th IEEE Conference on Decision and Control (CDC),
Gao, Sicun ; Xie, Le ; Solar-Lezama, Armando.. - p. 2613-2620 , 2015
 
?
13

Control Jujutsu : On the Weaknesses of Fine-Grained Cont..:

, In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security,
Evans, Isaac ; Long, Fan ; Otgonbaatar, Ulziibayar... - p. 901-913 , 2015
 
?
14

Abstract Data Machine : Data Classifier for Reliable Emb..:

, In: Proceedings of the WESS'15: Workshop on Embedded Systems Security,
 
1-15