Frederick T. Sheldon
Cited by
Cited by
Metrics for maintainability of class inheritance hierarchies
FT Sheldon, K Jerath, H Chung
Journal of Software Maintenance and Evolution: Research and Practice 14 (3 …, 2002
Blockchain: properties and misconceptions
DC de Leon, AQ Stalick, AA Jillepalli, MA Haney, FT Sheldon
Asia Pacific Journal of Innovation and Entrepreneurship, 2017
Reliability measurement: From theory to practice
FT Sheldon, KM Kavi, RC Tausworthe, JT Yu, R Brettschneider, ...
IEEE Software 9 (4), 13-20, 1992
Quantifying security threats and their potential impacts: a case study
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Innovations in Systems and Software Engineering 6 (4), 269-281, 2010
A methodology to evaluate agent oriented software engineering techniques
CE Lin, KM Kavi, FT Sheldon, KM Daley, RK Abercrombie
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
The insecurity of wireless networks
FT Sheldon, JM Weber, SM Yoo, WD Pan
IEEE Security & Privacy 10 (4), 54-61, 2012
Defining and computing a value based cyber-security measure
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Information Systems and e-Business Management 10 (4), 433-453, 2012
Reliability analysis of CSP specifications using Petri nets and Markov processes
KM Kavi, FT Sheldon, B Shirazi, AR Hurson
Proceedings of the Twenty-Eighth Annual Hawaii International Conference on …, 1995
Methodology for evaluating security controls based on key performance indicators and stakeholder mission
FT Sheldon, RK Abercrombie, A Mili
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
VIPAR: Advanced Information Agents discovering knowledge in an open and changing environment
T Potok, M Elmore, J Reed, FT Sheldon
Proc. 7th World Multiconference on Systemics, Cybernetics and Informatics …, 2003
Specification, safety and reliability analysis using Stochastic Petri Net models
FT Sheldon, S Greiner, M Benzinger
Tenth International Workshop on Software Specification and Design. IWSSD-10 …, 2000
Moving toward trustworthy systems: R&D Essentials
FT Sheldon, C Vishik
Computer 43 (9), 31-40, 2010
Authentication Protocol Using Quantum Superposition States.
Y Kanamori, SM Yoo, DA Gregory, FT Sheldon
IJ Network Security 9 (2), 101-108, 2009
A short survey on quantum computers
Y Kanamori, SM Yoo, WD Pan, FT Sheldon
International Journal of Computers and Applications 28 (3), 227-233, 2006
Dynamic data fusion using an ontology-based software agent system
MTETE Potok, FT Sheldon
Proceedings of the IIIS Agent Based Computing, Orlando 7, 2003
Risk assessment for industrial control systems quantifying availability using mean failure cost (MFC)
Q Chen, RK Abercrombie, FT Sheldon
Journal of Artificial Intelligence and Soft Computing Research 5 (3), 205-220, 2015
Evaluating security controls based on key performance indicators and stakeholder mission
FT Sheldon, RK Abercrombie, A Mili
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
Risk assessment methodology based on the NISTIR 7628 guidelines
RK Abercrombie, FT Sheldon, KR Hauser, MW Lantz, A Mili
2013 46th Hawaii International Conference on System Sciences, 1802-1811, 2013
Critical energy infrastructure survivability, inherent limitations, obstacles and mitigation strategies
F Sheldon, T Potok, A Krings, P Oman
International Journal of Power and Energy Systems 2, 86-92, 2004
Cyberspace security system
RK Abercrombie, FT Sheldon, EM Ferragut
US Patent 8,762,188, 2014
The system can't perform the operation now. Try again later.
Articles 1–20