Tarman, Thomas
10  results:
Search for persons X
?
1

Experimental Validation of a Command and Control Traffic De..:

Vugrin, Eric D. ; Hanson, Seth ; Cruz, Jerry...
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  3 - p. 1084-1097 , 2024
 
?
2

Validating an Emulation-Based Cybersecurity Model With a Ph..:

Huang, Hao ; Wlazlo, Patrick ; Sahu, Abhijeet...
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  4 - p. 2997-3011 , 2024
 
?
3

Defender Policy Evaluation and Resource Allocation With MIT..:

Outkin, Alexander V. ; Schulz, Patricia V. ; Schulz, Timothy..
IEEE Transactions on Dependable and Secure Computing.  20 (2023)  3 - p. 1909-1926 , 2023
 
?
4

Verification of Cyber Emulation Experiments Through Virtual..:

, In: Proceedings of the 15th Workshop on Cyber Security Experimentation and Test,
Thorpe, Jamie ; Swiler, Laura P. ; Hanson, Seth... - p. 71-80 , 2022
 
?
5

Comparing reproduced cyber experimentation studies across d..:

, In: Cyber Security Experimentation and Test Workshop,
Tarman, Thomas ; Rollins, Trevor ; Swiler, Laura... - p. 63-71 , 2021
 
?
6

Cyber threat modeling and validation : port scanning and..:

, In: Proceedings of the 7th Symposium on Hot Topics in the Science of Security,
 
?
7

Supercomputing interconnects:

, In: Proceedings of the 37th conference on Winter simulation,
Ganti, Anand ; Tarman, Thomas ; Wertz, Jason - p. 61-es , 2005
 
?
10

List of Contributors:

, In: Biodiversity and Biomedicine,
Abbas, Ghulam ; Ahmed, Nazeer ; Al-Harrasi, Ahmed... - p. xv-xviii , 2020
 
1-10