BibTeX records: Vincent Urias

download as .bib file

@article{DBLP:journals/corr/abs-2301-12013,
  author       = {Elijah Pelofske and
                  Lorie M. Liebrock and
                  Vincent Urias},
  title        = {Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j
                  Graph Database of Open Source Intelligence},
  journal      = {CoRR},
  volume       = {abs/2301.12013},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.12013},
  doi          = {10.48550/ARXIV.2301.12013},
  eprinttype    = {arXiv},
  eprint       = {2301.12013},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-12013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/JenkinsLU21,
  author       = {Donovan Jenkins and
                  Lorie M. Liebrock and
                  Vince Urias},
  title        = {Designing a Modular and Distributed Web Crawler Focused on Unstructured
                  Cybersecurity Intelligence},
  booktitle    = {2021 International Carnahan Conference on Security Technology, {ICCST}
                  2021, Hatfield, United Kingdom, October 11-15, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCST49569.2021.9717379},
  doi          = {10.1109/ICCST49569.2021.9717379},
  timestamp    = {Wed, 09 Mar 2022 09:34:35 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/JenkinsLU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/YuMZT0XULCYG21,
  author       = {Le Yu and
                  Shiqing Ma and
                  Zhuo Zhang and
                  Guanhong Tao and
                  Xiangyu Zhang and
                  Dongyan Xu and
                  Vincent E. Urias and
                  Han Wei Lin and
                  Gabriela F. Ciocarlie and
                  Vinod Yegneswaran and
                  Ashish Gehani},
  title        = {ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance
                  without Instrumentation},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/alchemist-fusing-application-and-audit-logs-for-precise-attack-provenance-without-instrumentation/},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/YuMZT0XULCYG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-02473,
  author       = {Elijah Pelofske and
                  Lorie M. Liebrock and
                  Vincent Urias},
  title        = {An Enhanced Machine Learning Topic Classification Methodology for
                  Cybersecurity},
  journal      = {CoRR},
  volume       = {abs/2109.02473},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.02473},
  eprinttype    = {arXiv},
  eprint       = {2109.02473},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-02473.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WalkupEXUL20,
  author       = {Gregory Walkup and
                  Sriharsha Etigowni and
                  Dongyan Xu and
                  Vincent Urias and
                  Han W. Lin},
  title        = {Forensic Investigation of Industrial Control Systems Using Deterministic
                  Replay},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162232},
  doi          = {10.1109/CNS48642.2020.9162232},
  timestamp    = {Thu, 13 Aug 2020 14:43:08 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/WalkupEXUL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-11143,
  author       = {Jonathan Crussell and
                  David Fritz and
                  Vince Urias},
  title        = {Automated Discovery for Emulytics},
  journal      = {CoRR},
  volume       = {abs/2003.11143},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.11143},
  eprinttype    = {arXiv},
  eprint       = {2003.11143},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-11143.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/StoutLUTSD18,
  author       = {William M. S. Stout and
                  Brian P. Van Leeuwen and
                  Vincent E. Urias and
                  Julian Tuminaro and
                  Spencer Schrock and
                  Nomaan Dossaji},
  title        = {Leveraging a LiveNirtual/Constructive Testbed for the Evaluation of
                  Moving Target Defenses},
  booktitle    = {2018 International Carnahan Conference on Security Technology, {ICCST}
                  2018, Montreal, QC, Canada, October 22-25, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CCST.2018.8585478},
  doi          = {10.1109/CCST.2018.8585478},
  timestamp    = {Wed, 09 Mar 2022 16:39:53 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/StoutLUTSD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/UriasLSL18,
  author       = {Vincent E. Urias and
                  Brian P. Van Leeuwen and
                  William M. S. Stout and
                  Han Lin},
  title        = {Applying a Threat Model to Cloud Computing},
  booktitle    = {2018 International Carnahan Conference on Security Technology, {ICCST}
                  2018, Montreal, QC, Canada, October 22-25, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CCST.2018.8585471},
  doi          = {10.1109/CCST.2018.8585471},
  timestamp    = {Tue, 15 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/UriasLSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/UriasSLL18,
  author       = {Vincent E. Urias and
                  William M. S. Stout and
                  Brian P. Van Leeuwen and
                  Han Lin},
  title        = {Cyber Range Infrastructure Limitations and Needs of Tomorrow: {A}
                  Position Paper},
  booktitle    = {2018 International Carnahan Conference on Security Technology, {ICCST}
                  2018, Montreal, QC, Canada, October 22-25, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CCST.2018.8585460},
  doi          = {10.1109/CCST.2018.8585460},
  timestamp    = {Tue, 15 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/UriasSLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sc2/UriasSLL18,
  author       = {Vincent E. Urias and
                  William M. S. Stout and
                  Caleb Loverro and
                  Brian P. Van Leeuwen},
  title        = {Get Your Head Out of the Clouds: The Illusion of Confidentiality {\&}
                  Privacy},
  booktitle    = {8th {IEEE} International Symposium on Cloud and Service Computing,
                  {SC2} 2018, Paris, France, November 18-21, 2018},
  pages        = {57--66},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SC2.2018.00015},
  doi          = {10.1109/SC2.2018.00015},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sc2/UriasSLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/RaybournKFU18,
  author       = {Elaine M. Raybourn and
                  Michael Kunz and
                  David Fritz and
                  Vince Urias},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {A Zero-Entry Cyber Range Environment for Future Learning Ecosystems},
  booktitle    = {Cyber-Physical Systems Security},
  pages        = {93--109},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98935-8\_5},
  doi          = {10.1007/978-3-319-98935-8\_5},
  timestamp    = {Fri, 08 Mar 2019 12:57:04 +0100},
  biburl       = {https://dblp.org/rec/books/sp/18/RaybournKFU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/LeeuwenEU17,
  author       = {Brian P. Van Leeuwen and
                  John Eldridge and
                  Vincent Urias},
  title        = {Cyber analysis emulation platform for wireless communication network
                  protocols},
  booktitle    = {International Carnahan Conference on Security Technology, {ICCST}
                  2017, Madrid, Spain, October 23-26, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CCST.2017.8167803},
  doi          = {10.1109/CCST.2017.8167803},
  timestamp    = {Wed, 09 Mar 2022 16:39:53 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/LeeuwenEU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/UriasSLGLM17,
  author       = {Vincent E. Urias and
                  William M. S. Stout and
                  Jean{-}Luc Watson and
                  Cole Grim and
                  Lorie M. Liebrock and
                  Monzy Merza},
  title        = {Technologies to enable cyber deception},
  booktitle    = {International Carnahan Conference on Security Technology, {ICCST}
                  2017, Madrid, Spain, October 23-26, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CCST.2017.8167793},
  doi          = {10.1109/CCST.2017.8167793},
  timestamp    = {Wed, 30 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/UriasSLGLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/UriasSLY16,
  author       = {Vincent E. Urias and
                  William M. S. Stout and
                  Caleb Loverro and
                  John W. Young},
  title        = {Hypervisor Assisted Forensics and Incident Response in the Cloud},
  booktitle    = {2016 {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2016, Nadi, Fiji, December 8-10, 2016},
  pages        = {768--775},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIT.2016.104},
  doi          = {10.1109/CIT.2016.104},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/UriasSLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/LeeuwenSU16,
  author       = {Brian P. Van Leeuwen and
                  William M. S. Stout and
                  Vincent Urias},
  title        = {{MTD} assessment framework with cyber attack modeling},
  booktitle    = {{IEEE} International Carnahan Conference on Security Technology, {ICCST}
                  2016, Orlando, FL, USA, October 24-27, 2016},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CCST.2016.7815722},
  doi          = {10.1109/CCST.2016.7815722},
  timestamp    = {Wed, 09 Mar 2022 16:39:53 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/LeeuwenSU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/StoutU16,
  author       = {William M. S. Stout and
                  Vincent E. Urias},
  title        = {Challenges to securing the Internet of Things},
  booktitle    = {{IEEE} International Carnahan Conference on Security Technology, {ICCST}
                  2016, Orlando, FL, USA, October 24-27, 2016},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CCST.2016.7815675},
  doi          = {10.1109/CCST.2016.7815675},
  timestamp    = {Wed, 07 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/StoutU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/LeeuwenSU16,
  author       = {Brian P. Van Leeuwen and
                  William M. S. Stout and
                  Vincent E. Urias},
  editor       = {Jerry Brand and
                  Matthew C. Valenti and
                  Akinwale Akinpelu and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {Empirical assessment of network-based Moving Target Defense approaches},
  booktitle    = {2016 {IEEE} Military Communications Conference, {MILCOM} 2016, Baltimore,
                  MD, USA, November 1-3, 2016},
  pages        = {764--769},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/MILCOM.2016.7795421},
  doi          = {10.1109/MILCOM.2016.7795421},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/LeeuwenSU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/UriasSL15,
  author       = {Vincent E. Urias and
                  William M. S. Stout and
                  Caleb Loverro},
  title        = {Computer network deception as a Moving Target Defense},
  booktitle    = {International Carnahan Conference on Security Technology, {ICCST}
                  2015, Taipei, Taiwan, September 21-24, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CCST.2015.7389665},
  doi          = {10.1109/CCST.2015.7389665},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/UriasSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/LeeuwenSU15,
  author       = {Brian P. Van Leeuwen and
                  William M. S. Stout and
                  Vincent Urias},
  editor       = {Qinqing Zhang and
                  Jerry Brand and
                  Thomas G. MacDonald and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {Operational cost of deploying Moving Target Defenses defensive work
                  factors},
  booktitle    = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa,
                  FL, USA, October 26-28, 2015},
  pages        = {966--971},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/MILCOM.2015.7357570},
  doi          = {10.1109/MILCOM.2015.7357570},
  timestamp    = {Thu, 07 Nov 2019 09:04:27 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/LeeuwenSU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/LeeuwenUGI13,
  author       = {Brian P. Van Leeuwen and
                  Vincent Urias and
                  Casey Glatter and
                  Alex Interrante{-}Grant},
  editor       = {Joe Senftle and
                  Mike Beltrani and
                  Kari Karwedsky},
  title        = {Testbed for Cellular Telecommunications Cyber Vulnerability Analysis},
  booktitle    = {32th {IEEE} Military Communications Conference, {MILCOM} 2013, San
                  Diego, CA, USA, November 18-20, 2013},
  pages        = {1391--1397},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/MILCOM.2013.236},
  doi          = {10.1109/MILCOM.2013.236},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/LeeuwenUGI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/UriasLR12,
  author       = {Vincent Urias and
                  Brian P. Van Leeuwen and
                  Bryan Richardson},
  title        = {Supervisory Command and Data Acquisition {(SCADA)} system cyber security
                  analysis using a live, virtual, and constructive {(LVC)} testbed},
  booktitle    = {31st {IEEE} Military Communications Conference, {MILCOM} 2012, Orlando,
                  FL, USA, October 29 - November 1, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/MILCOM.2012.6415818},
  doi          = {10.1109/MILCOM.2012.6415818},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/UriasLR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/UriasHL08,
  author       = {Vincent Urias and
                  Curtis Hash and
                  Lorie M. Liebrock},
  title        = {Consideration of Issues for Parallel Digital Forensics of {RAID} Systems},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {4},
  pages        = {196--208},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280903140953},
  doi          = {10.1080/15567280903140953},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/UriasHL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/LiebrockMBPCSU07,
  author       = {Lorie M. Liebrock and
                  Nico Marrero and
                  David P. Burton and
                  Ron Prine and
                  E. Cornelius and
                  M. Shakamuri and
                  Vincent Urias},
  editor       = {Yookun Cho and
                  Roger L. Wainwright and
                  Hisham Haddad and
                  Sung Y. Shin and
                  Yong Wan Koo},
  title        = {A preliminary design for digital forensics analysis of terabyte size
                  data sets},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Applied Computing (SAC),
                  Seoul, Korea, March 11-15, 2007},
  pages        = {190--191},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1244002.1244052},
  doi          = {10.1145/1244002.1244052},
  timestamp    = {Sun, 02 Jun 2019 21:18:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/LiebrockMBPCSU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics