Pablo Moriano
Pablo Moriano
Research Scientist, Oak Ridge National Laboratory
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Factors in an end user security expertise instrument
P Rajivan, P Moriano, T Kelley, LJ Camp
Information & Computer Security 25 (2), 190-205, 2017
Insider threat event detection in user-system interactions
P Moriano, J Pendleton, S Rich, LJ Camp
Proceedings of the 2017 International Workshop on Managing Insider Security …, 2017
On the formation of structure in growing networks
P Moriano, J Finke
Journal of Statistical Mechanics: Theory and Experiment 2013 (06), P06010, 2013
Community-based event detection in temporal networks
P Moriano, J Finke, YY Ahn
Scientific reports 9 (1), 4358, 2019
Modelado y control de un nuevo sistema bola viga con levitación magnética
P Moriano, F Naranjo
Revista iberoamericana de automática e informática industrial 9 (3), 249-258, 2012
Using bursty announcements for detecting BGP routing anomalies
P Moriano, R Hill, LJ Camp
Computer Networks 188, 107835, 2021
Time-based can intrusion detection benchmark
DH Blevins, P Moriano, RA Bridges, ME Verma, MD Iannacone, ...
arXiv preprint arXiv:2101.05781, 2021
Stopping the Insider at the Gates: Protecting Organizational Assets through Graph Mining.
P Moriano, J Pendleton, S Rich, LJ Camp
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (1), 4-29, 2018
What Can Johnny Do?–Factors in an End-User Expertise Instrument.
P Rajivan, P Moriano, T Kelley, LJ Camp
HAISA, 199-208, 2016
Addressing the lack of comparability & testing in CAN intrusion detection research: A comprehensive guide to CAN IDS data & introduction of the ROAD dataset
ME Verma, MD Iannacone, RA Bridges, SC Hollifield, P Moriano, B Kay, ...
arXiv preprint arXiv:2012.14600, 2020
Lessons learnt from comparing WhatsApp privacy concerns across Saudi and Indian populations
J Dev, P Moriano Salazar, J Camp
Oak Ridge National Lab.(ORNL), Oak Ridge, TN (United States), 2020
Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies
P Moriano, S Achar, LJ Camp
Computers & Security 70, 319-334, 2017
Power-law weighted networks from local attachments
P Moriano, J Finke
Europhysics Letters 99 (1), 18002, 2012
Dissemination of scholarly literature in social media
P Moriano, E Ferrara, A Flammini, F Menczer
Altmetric. org, 2014
Macroeconomic analysis of routing anomalies
P Moriano, S Achar, LJ Camp
TPRC, 2016
Model-based fraud detection in growing networks
P Moriano, J Finke
53rd IEEE Conference on Decision and Control, 6068-6073, 2014
Structure of growing networks with no preferential attachment
P Moriano, J Finke
2013 American Control Conference, 1088-1093, 2013
Data Reduction.
R Zhang, A Malviya-Thakur, J Borreguero, P Peterson, R Whitfield, ...
Encyclopedia of Database Systems, 621-626, 2009
Heavy-tailed weighted networks from local attachment strategies
P Moriano, J Finke
2011 50th IEEE Conference on Decision and Control and European Control …, 2011
Detecting CAN Masquerade Attacks with Signal Clustering Similarity
P Moriano, RA Bridges, MD Iannacone
arXiv preprint arXiv:2201.02665, 2022
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20