Follow
Thomas Edgar
Title
Cited by
Cited by
Year
Research methods for cyber security
TW Edgar, DO Manz
Syngress, 2017
3792017
Exploratory study
TW Edgar, DO Manz
Research methods for cyber security 29, 95-130, 2017
1452017
Securing wide area measurement systems
MD Hadley, JB McBride, TW Edgar, LR O’Neil, JD Johnson
US Department of Energy, 2007
552007
Predictive modeling for insider threat mitigation
FL Greitzer, P Paulson, L Kangas, LR Franklin, TW Edgar, DA Frincke
Richland, WA: Pacific Northwest National Laboratory, 6-17, 2009
532009
Chapter 6-machine learning
TW Edgar, DO Manz
Research methods for cyber security, 153-173, 2017
432017
Chapter 2-science and cyber security
TW Edgar, DO Manz
Research methods for cyber security, 33-62, 2017
372017
Security and privacy in cyber-physical systems
GA Fink, TW Edgar, TR Rice, DG MacDonald, CE Crawford
Cyber-physical systems, 129-141, 2017
362017
Evaluating transactive controls of integrated transmission and distribution systems using the framework for network co-simulation
J Hansen, T Edgar, J Daily, D Wu
2017 American control conference (ACC), 4010-4017, 2017
272017
Extracting dependencies between network assets using deep learning
TE Carroll, S Chikkagoudar, TW Edgar, KJ Oler, KM Arthur, DM Johnson, ...
US Patent 10,833,954, 2020
222020
Towards an experimental testbed facility for cyber-physical security research
T Edgar, D Manz, T Carroll
Proceedings of the Seventh Annual Workshop on Cyber Security and Information …, 2011
222011
Overview of security and privacy in cyber‐physical systems
GA Fink, TW Edgar, TR Rice, DG MacDonald, CE Crawford
Security and Privacy in Cyber‐Physical Systems: Foundations, Principles and …, 2017
172017
Chapter 3—Starting Your Research
TW Edgar, DO Manz
Research methods for cyber security, 63-92, 2017
172017
Realizing scientific methods for cyber security
TE Carroll, D Manz, T Edgar, FL Greitzer
Proceedings of the 2012 Workshop on Learning from Authoritative Security …, 2012
172012
AGA-12, Part 2 performance test results
MD Hadley, KA Huston, TW Edgar
Pacific Northwest National Laboratories, 2007
172007
Chapter 5-descriptive study
TW Edgar, DO Manz
Research methods for cyber security, 131-151, 2017
142017
Convenience sampling
TW Edgar, DO Manz
Research methods for cyber security, 2017
132017
Applied Experimentation
T Edgar, D Manz
Research Methods for Cyber Security, 271-297, 2019
102019
Model-driven deception for control system environments
W Hofer, T Edgar, D Vrabie, K Nowak
2019 IEEE International Symposium on Technologies for Homeland Security (HST …, 2019
82019
Experiment as a service
TW Edgar, TR Rice
2017 IEEE International Symposium on Technologies for Homeland Security (HST …, 2017
82017
A high-fidelity cyber-physical testbed-based benchmarking dataset for testing operational technology specific intrusion detection systems
A Ashok, T Edgar
2021 IEEE International Symposium on Technologies for Homeland Security (HST …, 2021
72021
The system can't perform the operation now. Try again later.
Articles 1–20