


default search action
Brian Weber
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j7]Sean Oesch
, Phillipe Austria
, Amul Chaulagain
, Brian Weber
, Cory L. Watson
, Matthew Dixson
, Amir Sadovnik
:
The Path to Autonomous Cyberdefense. IEEE Secur. Priv. 23(1): 38-46 (2025) - [c7]Luke Koch, Sean Oesch
, Amir Sadovnik, Brian Weber, Amul Chaulagain, Matthew Dixson, Jared Dixon
, Mike Huettel, Cory L. Watson, Jacob Hartman, Richard Patulski:
On the Abuse and Detection of Polyglot Files. WWW 2025: 4810-4822 - 2024
- [c6]Sean Oesch
, Amul Chaulagain
, Brian Weber
, Matthew Dixson
, Amir Sadovnik
, Benjamin Roberson
, Cory L. Watson
, Phillipe Austria
:
Towards a High Fidelity Training Environment for Autonomous Cyber Defense Agents. CSET @ USENIX Security Symposium 2024: 91-99 - [i9]Sean Oesch, Phillipe Austria, Amul Chaulagain, Brian Weber, Cory L. Watson, Matthew Dixson, Amir Sadovnik:
The Path To Autonomous Cyber Defense. CoRR abs/2404.10788 (2024) - [i8]Brian Weber:
Stability of Information in the Heat Flow Clustering. CoRR abs/2405.01244 (2024) - [i7]Luke Koch
, Sean Oesch, Amul Chaulagain, Jared Dixon, Matthew Dixon, Mike Huettal, Amir Sadovnik, Cory L. Watson, Brian Weber, Jacob Hartman, Richard Patulski:
On the Abuse and Detection of Polyglot Files. CoRR abs/2407.01529 (2024) - 2023
- [j6]Robert A. Bridges
, Ashley E. Rice
, Sean Oesch
, Jeffrey A. Nichols, Cory L. Watson, Kevin D. Spakes, Savannah Norem, Mike Huettel, Brian Jewell
, Brian Weber
, Connor Gannon
, Olivia Bizovi, Samuel C. Hollifield, Samantha Erwin
:
Testing SOAR tools in use. Comput. Secur. 129: 103201 (2023) - [j5]Robert A. Bridges, Sean Oesch
, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeffrey A. Nichols
, Brian Weber, Miki E. Verma, Daniel Scofield, Craig Miles
, Thomas Plummer, Mark Daniell
, Anne M. Tall, Justin M. Beaver, Jared M. Smith:
Beyond the Hype: An Evaluation of Commercially Available Machine Learning-based Malware Detectors. DTRAP 4(2): 27:1-27:22 (2023) - [c5]Robert A. Bridges, Brian Weber, Justin M. Beaver, Jared M. Smith, Miki E. Verma, Savannah Norem, Kevin D. Spakes, Cory L. Watson, Jeffrey A. Nichols, Brian Jewell, Michael D. Iannacone, Chelsey Dunivan Stahl, Kelly M. T. Huffer, T. Sean Oesch:
AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors. IEEE Big Data 2023: 1620-1629 - [i6]Robert A. Bridges, Brian Weber, Justin M. Beaver, Jared M. Smith, Miki E. Verma, Savannah Norem, Kevin D. Spakes, Cory L. Watson, Jeffrey A. Nichols, Brian Jewell, Michael D. Iannacone, Chelsey Dunivan Stahl, Kelly M. T. Huffer, T. Sean Oesch:
AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors. CoRR abs/2308.14835 (2023) - 2022
- [c4]Jordan Johnson
, Brian Weber, Jared M. Smith, Chris Hathhorn
, Philip Irminger, Savannah Norem, Jennifer Guerra, Joel A. Dawson
, Tyler McDaniel:
VAC: A Software Approach to Resilient SCADA Automation. ISGT 2022: 1-5 - [c3]Luke Koch
, Sean Oesch, Amul Chaulagain, Mary Adkisson, Samantha Erwin, Brian Weber:
Toward the Detection of Polyglot Files. CSET @ USENIX Security Symposium 2022: 120-128 - [i5]Luke Koch, Sean Oesch, Mary Adkisson, Samantha Erwin, Brian Weber, Amul Chaulagain:
Toward the Detection of Polyglot Files. CoRR abs/2203.07561 (2022) - [i4]Robert A. Bridges, Ashley E. Rice, Sean Oesch, Jeffrey A. Nichols, Cory L. Watson, Kevin D. Spakes, Savannah Norem, Mike Huettel, Brian Jewell, Brian Weber, Connor Gannon, Olivia Bizovi, Samuel C. Hollifield, Samantha Erwin:
Testing SOAR Tools in Use. CoRR abs/2208.06075 (2022) - 2021
- [c2]Savannah Norem
, Ashley E. Rice
, Samantha Erwin
, Robert A. Bridges
, Sean Oesch
, Brian Weber
:
A Mathematical Framework for Evaluation of SOAR Tools with Limited Survey Data. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 557-575 - [c1]Sean Oesch, Robert A. Bridges, Miki E. Verma, Brian Weber, Oumar Diallo:
D2U: Data Driven User Emulation for the Enhancement of Cyber Testing, Training, and Data Set Generation. CSET @ USENIX Security Symposium 2021: 17-26 - [i3]Savannah Norem, Ashley E. Rice, Samantha Erwin, Robert A. Bridges, Sean Oesch, Brian Weber:
A Mathematical Framework for Evaluation of SOAR Tools with Limited Survey Data. CoRR abs/2112.00100 (2021) - 2020
- [j4]Enis Golaszewski
, Alan T. Sherman, Linda Oliva
, Peter A. H. Peterson, Michael R. Bailey, Scott Bohon, Cyrus J. Bonyadi, Casey Borror, Ryan Coleman, Johannah Flenner, Elias Enamorado, Maksim Ekin Eren, Mohammad Khan, Emmanuel Larbi, Kyle Marshall, William Morgan, Lauren Mundy, Gabriel Onana, Selma Gomez Orr, Lauren Parker, Caleb Pinkney, Mykah Rather, Jimmy Rodriguez, Bryan Solis, Wubnyonga Tete, Tsigereda B. Tsega, Edwin Valdez, Charles K. Varga, Brian Weber, Ryan Wnuk-Fink, Armand Yonkeu, Lindsay Zetlmeisl, Damian Doyle, Casey O'Brien, Joseph Roundy, Jack Suess:
Project-based learning continues to inspire cybersecurity students: the 2018-2019 SFS research studies at UMBC. Inroads 11(2): 46-54 (2020) - [i2]Robert A. Bridges, Sean Oesch, Miki E. Verma, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeffrey A. Nichols, Brian Weber, Justin M. Beaver, Jared M. Smith, Daniel Scofield, Craig Miles, Thomas Plummer, Mark Daniell, Anne M. Tall:
Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection. CoRR abs/2012.09214 (2020)
2010 – 2019
- 2019
- [j3]Alan T. Sherman
, Enis Golaszewski
, Edward LaFemina, Ethan Goldschen, Mohammed Khan, Lauren Mundy, Mykah Rather, Bryan Solis, Wubnyonga Tete, Edwin Valdez, Brian Weber, Damian Doyle, Casey O'Brien, Linda Oliva, Joseph Roundy, Jack Suess:
The SFS summer research study at UMBC: Project-based learning inspires cybersecurity students. Cryptologia 43(4): 293-312 (2019) - [j2]Alan T. Sherman
, Peter A. H. Peterson, Enis Golaszewski
, Edward LaFemina, Ethan Goldschen, Mohammed Khan, Lauren Mundy, Mykah Rather, Bryan Solis, Wubnyonga Tete, Edwin Valdez, Brian Weber, Damian Doyle, Casey O'Brien, Linda Oliva, Joseph Roundy, Jack Suess:
Project-Based Learning Inspires Cybersecurity Students: A Scholarship-for-Service Research Study. IEEE Secur. Priv. 17(3): 82-88 (2019) - 2018
- [i1]Alan T. Sherman, Enis Golaszewski, Edward LaFemina, Ethan Goldschen, Mohammed Khan, Lauren Mundy, Mykah Rather, Bryan Solis, Wubnyonga Tete, Edwin Valdez, Brian Weber, Damian Doyle, Casey O'Brien, Linda Oliva, Joseph Roundy, Jack Suess:
The SFS Summer Research Study at UMBC: Project-Based Learning Inspires Cybersecurity Students. CoRR abs/1811.04794 (2018)
2000 – 2009
- 2002
- [j1]William J. Floyd, Brian Weber, Jeffrey R. Weeks:
The Achilles' Heel of O(3, 1)? Exp. Math. 11(1): 91-97 (2002)
Coauthor Index
aka: T. Sean Oesch

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-02 23:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint