Unmanned aerial vehicle security using recursive parameter estimation Z Birnbaum, A Dolgikh, V Skormin, E O’Brien, D Muller, C Stracquodaine Journal of Intelligent & Robotic Systems 84, 107-120, 2016 | 98 | 2016 |
Unmanned aerial vehicle security using behavioral profiling Z Birnbaum, A Dolgikh, V Skormin, E O'Brien, D Muller, C Stracquodaine 2015 International conference on unmanned aircraft systems (ICUAS), 1310-1319, 2015 | 63 | 2015 |
Cloud security auditing based on behavioral modeling Z Birnbaum, B Liu, A Dolgikh, Y Chen, V Skormin 2013 IEEE Ninth World Congress on Services, 268-273, 2013 | 17 | 2013 |
Using behavioral modeling and customized normalcy profiles as protection against targeted cyber-attacks A Dolgikh, T Nykodym, V Skormin, Z Birnbaum Computer Network Security: 6th International Conference on Mathematical …, 2012 | 16 | 2012 |
Automated vulnerability testing via executable attack graphs D Malzahn, Z Birnbaum, C Wright-Hamor 2020 International Conference on Cyber Security and Protection of Digital …, 2020 | 15 | 2020 |
Behavioral modeling for suspicious process detection in cloud computing environments A Dolgikh, Z Birnbaum, Y Chen, V Skormin 2013 IEEE 14th International Conference on Mobile Data Management 2, 177-181, 2013 | 11 | 2013 |
The behavioral approach to diagnostics of cyber-physical systems V Skormin, A Dolgikh, Z Birnbaum 2014 IEEE AUTOTEST, 26-30, 2014 | 8 | 2014 |
Cyber-resilient scada systems via secure state restoration Z Birnbaum, M Davis, S Salman, J Schaffter, L Watkins, S Yamajala, ... Critical Infrastructure Protection XIV: 14th IFIP WG 11.10 International …, 2020 | 5 | 2020 |
Cloud security auditing based on behavioural modelling A Dolgikh, Z Birnbaum, B Liu, Y Chen, V Skormin International Journal of Business Process Integration and Management 7 (2 …, 2014 | 5 | 2014 |
Customized behavioral normalcy profiles for critical infrastructure protection A Dolgikh, Z Birnbaum, V Skormin 8th Annual Symposium on Information Assurance (ASIA 2013), Albany, NY, 15-22, 2013 | 4 | 2013 |
Behavior based analytics for securing cyber-physical systems Z Birnbaum State University of New York at Binghamton, 2015 | 3 | 2015 |
ACE: Advanced CIP Evaluator K Gordon, M Davis, Z Birnbaum, A Dolgikh Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and …, 2018 | 2 | 2018 |
Intrusion detection using n-grams of object access graph components Z Birnbaum, A Dolgikh, V Skormin Proc of the 8th International Conference on Digital Society, 209-215, 2014 | 2 | 2014 |
Security-Enhanced Serial Communications J White, A Beall, J Maurio, D Fichter, M Davis, Z Birnbaum Military Cyber Affairs 6 (1), 2, 2023 | | 2023 |
Correction to: Cyber-Resilient SCADA Systems via Secure State Restoration Z Birnbaum, M Davis, S Salman, J Cervini, L Watkins, S Yamajala, S Paul International Conference on Critical Infrastructure Protection, C1-C1, 2020 | | 2020 |
Graduate Students’ Conference Publications AF Baroughi, Z Birnbaum, B Liu, A Dolgikh, MR Blondet, S Chen, C Dai, ... | | |