John Hale
Cited by
Cited by
Learning to coordinate without sharing information
S Sen, M Sekaran, J Hale
AAAI 94, 426-431, 1994
Modeling internet attacks
T Tidwell, R Larson, K Fitch, J Hale
Proceedings of the 2001 IEEE Workshop on Information Assurance and security 59, 2001
Method to inhibit the identification and retrieval of proprietary media via automated search engines utilized in association with computer compatible communications network
JC Hale, GW Manes
US Patent 6,732,180, 2004
A systematic approach to multi-stage network attack analysis
J Dawkins, J Hale
Second IEEE International Information Assurance Workshop, 2004. Proceedings …, 2004
Modeling network attacks: Extending the attack tree paradigm
J Dawkins, C Campbell, J Hale
Workshop on Statistical and Machine Learning Techniques in Computer …, 2002
A genetic algorithm for fragment allocation in a distributed database system
AL Corcoran, J Hale
Proceedings of the 1994 ACM symposium on Applied computing, 247-250, 1994
Securing ss7 telecommunications networks
G Lorenz, T Moore, G Manes, J Hale, S Shenoi
Workshop on Information Assurance and Security 2, 1115, 2001
Using hybrid attack graphs to model cyber-physical attacks in the smart grid
PJ Hawrylak, M Haney, M Papa, J Hale
2012 5th International symposium on resilient control systems, 161-164, 2012
Qualitative and quantitative analytical techniques for network security assessment
K Clark, S Tyree, J Dawkins, J Hale
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004
Security policy coordination for heterogeneous information systems
J Hale, P Galiasso, M Papa, S Shenoi
Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99 …, 1999
Preserving privacy in structural neuroimages
N Schimke, M Kuehler, J Hale
Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 …, 2011
Catalytic inference analysis: Detecting inference threats due to knowledge discovery
J Hale, S Shenoi
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
Analyzing FD inference in relational databases
J Hale, S Shenoi
Data & Knowledge Engineering 18 (2), 167-183, 1996
Compliance method for a cyber-physical system
JC Hale, PJ Hawrylak, MJ Papa
US Patent 9,471,789, 2016
Security risks associated with radio frequency identification in medical environments
PJ Hawrylak, N Schimke, J Hale, M Papa
Journal of medical systems 36, 3491-3505, 2012
Security risk metrics: Fusing enterprise objectives and vulnerabilities
K Clark, J Dawkins, J Hale
Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop …, 2005
Secur (e/ity) management: A continuing uphill climb
J Hale, P Brusil
Journal of Network and Systems Management 15, 525-553, 2007
Packet sniffing for automated chat room monitoring and evidence preservation
A Meehan, G Manes, L Davis, J Hale, S Shenoi
Workshop on Information Assurance and Security 2, 1045, 2001
Policy mediation for multi-enterprise environments
P Galiasso, O Bremer, J Hale, S Shenoi, D Ferraiola, V Hu
Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00 …, 2000
Quickshear Defacing for Neuroimages.
N Schimke, J Hale
HealthSec 11, 11, 2011
The system can't perform the operation now. Try again later.
Articles 1–20