Follow
John Hale
Title
Cited by
Cited by
Year
Learning to coordinate without sharing information
S Sen, M Sekaran, J Hale
AAAI 94, 426-431, 1994
4931994
Modeling internet attacks
T Tidwell, R Larson, K Fitch, J Hale
Proceedings of the 2001 IEEE Workshop on Information Assurance and security 59, 2001
2452001
Method to inhibit the identification and retrieval of proprietary media via automated search engines utilized in association with computer compatible communications network
JC Hale, GW Manes
US Patent 6,732,180, 2004
1512004
A systematic approach to multi-stage network attack analysis
J Dawkins, J Hale
Second IEEE International Information Assurance Workshop, 2004. Proceedings …, 2004
1442004
Modeling network attacks: Extending the attack tree paradigm
J Dawkins, C Campbell, J Hale
Workshop on Statistical and Machine Learning Techniques in Computer …, 2002
1102002
A genetic algorithm for fragment allocation in a distributed database system
AL Corcoran, J Hale
Proceedings of the 1994 ACM symposium on Applied computing, 247-250, 1994
801994
Securing ss7 telecommunications networks
G Lorenz, T Moore, G Manes, J Hale, S Shenoi
Workshop on Information Assurance and Security 2, 1115, 2001
662001
Using hybrid attack graphs to model cyber-physical attacks in the smart grid
PJ Hawrylak, M Haney, M Papa, J Hale
2012 5th International symposium on resilient control systems, 161-164, 2012
512012
Qualitative and quantitative analytical techniques for network security assessment
K Clark, S Tyree, J Dawkins, J Hale
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004
392004
Security policy coordination for heterogeneous information systems
J Hale, P Galiasso, M Papa, S Shenoi
Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99 …, 1999
391999
Preserving privacy in structural neuroimages
N Schimke, M Kuehler, J Hale
Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 …, 2011
382011
Catalytic inference analysis: Detecting inference threats due to knowledge discovery
J Hale, S Shenoi
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
371997
Analyzing FD inference in relational databases
J Hale, S Shenoi
Data & Knowledge Engineering 18 (2), 167-183, 1996
371996
Compliance method for a cyber-physical system
JC Hale, PJ Hawrylak, MJ Papa
US Patent 9,471,789, 2016
342016
Security risks associated with radio frequency identification in medical environments
PJ Hawrylak, N Schimke, J Hale, M Papa
Journal of medical systems 36, 3491-3505, 2012
282012
Security risk metrics: Fusing enterprise objectives and vulnerabilities
K Clark, J Dawkins, J Hale
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop …, 2005
282005
Secur (e/ity) management: A continuing uphill climb
J Hale, P Brusil
Journal of Network and Systems Management 15, 525-553, 2007
272007
Packet sniffing for automated chat room monitoring and evidence preservation
A Meehan, G Manes, L Davis, J Hale, S Shenoi
Workshop on Information Assurance and Security 2, 1045, 2001
272001
Policy mediation for multi-enterprise environments
P Galiasso, O Bremer, J Hale, S Shenoi, D Ferraiola, V Hu
Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00 …, 2000
252000
Quickshear Defacing for Neuroimages.
N Schimke, J Hale
HealthSec 11, 11, 2011
242011
The system can't perform the operation now. Try again later.
Articles 1–20