Follow
Joel A. Dawson
Title
Cited by
Cited by
Year
Neural network analysis of system call timing for rootkit detection
P Luckett, JT McDonald, J Dawson
2016 Cybersecurity Symposium (CYBERSEC), 1-6, 2016
342016
Phase space detection of virtual machine cyber events through hypervisor-level system call analysis
JA Dawson, JT McDonald, L Hively, TR Andel, M Yampolskiy, C Hubbard
2018 1st International Conference on Data Intelligence and Security (ICDIS …, 2018
222018
Improving penetration testing methodologies for security-based risk assessment
J Dawson, JT McDonald
2016 Cybersecurity Symposium (CYBERSEC), 51-58, 2016
162016
Identifying stealth malware using CPU power consumption and learning algorithms
P Luckett, JT McDonald, WB Glisson, R Benton, J Dawson, BA Doyle
Journal of Computer Security 26 (5), 589-613, 2018
152018
Rootkit detection through phase-space analysis of power voltage measurements
JA Dawson, JT McDonald, J Shropshire, TR Andel, P Luckett, L Hively
2017 12th International Conference on Malicious and Unwanted Software …, 2017
122017
Rootkit detection system
J Dawson, A Passian
US Patent 11,074,345, 2021
62021
Manipulation of G-code toolpath files in 3D printers: Attacks and mitigations
E Kurkowski, A Van Stockum, J Dawson, C Taylor, T Schulz, S Shenoi
International Conference on Critical Infrastructure Protection, 155-174, 2022
42022
Stealthy cyber anomaly detection on large noisy multi-material 3d printer datasets using probabilistic models
S Yoginath, M Iannacone, V Tansakul, A Passian, R Jordan, J Asiamah, ...
Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing (3D …, 2022
32022
Rootkit detection through phase-space analysis of system call timing and power data
J Dawson
University of South Alabama, 2017
32017
Investigating the applicability of a moving target defense for SCADA systems
CC Davidson, J Dawson, P Carsten, M Yampolskiy, TR Andel
3rd International Symposium for ICS & SCADA Cyber Security Research 2015 …, 2015
32015
Bayesian estimation of oscillator parameters: Toward anomaly detection and cyber-physical system security
JM Lukens, A Passian, S Yoginath, KJH Law, JA Dawson
Sensors 22 (16), 6112, 2022
22022
Control-Theory-Informed Feature Selection for Detecting Malicious Tampering in Additive Layer Manufacturing Processes
J Dawson, M Iannacone, S Yoginath, V Tansakul, R Jordan, A Passian, ...
Proceedings of the 16th International Conference on Cyber Warfare and …, 2021
22021
Heartbeat: Detecting Malware by Periodic Power Signal Injection and Monitoring
SJ Prowell, J Dawson, A Passian
Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States), 2024
2024
VAC: A Software Approach to Resilient SCADA Automation
J Johnson, B Weber, J Smith, C Hathhorn, P Irminger, S Norem, J Guerra, ...
2022 IEEE Power & Energy Society Innovative Smart Grid Technologies …, 2022
2022
ATTACK-DEFENSE MODELING OF MATERIAL EXTRUSION ADDITIVE MANUFACTURING SYSTEMS
A Van Stockum, E Kurkowski, T Potok, C Taylor, J Dawson, M Rice, ...
International Conference on Critical Infrastructure Protection, 121-153, 2022
2022
Rootkit detection system
J Dawson, A Passian
Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States), 2021
2021
Heartbeat Malware Detection
JA Dawson, AE Ferber
Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States), 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–17