这是indexloc提供的服务,不要输入任何密码

BibTeX records: Thomas H. Morris

download as .bib file

@inproceedings{DBLP:conf/secrypt/SheldonBPM25,
  author       = {Jared Sheldon and
                  Isabelle Brown{-}Cantrell and
                  Patrick Pape and
                  Thomas H. Morris},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Highlighting Vulnerabilities in a Genomics Biocybersecurity Lab Through
                  Threat Modeling and Security Testing},
  booktitle    = {Proceedings of the 22nd International Conference on Security and Cryptography,
                  {SECRYPT} 2025, Bilbao, Spain, June 11-13, 2025},
  pages        = {626--631},
  publisher    = {{SCITEPRESS}},
  year         = {2025},
  url          = {https://doi.org/10.5220/0013523800003979},
  doi          = {10.5220/0013523800003979},
  timestamp    = {Tue, 22 Jul 2025 15:34:12 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SheldonBPM25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/SheldonRMBZPW24,
  author       = {Jared Sheldon and
                  Scott Ross and
                  Thomas H. Morris and
                  Isabelle Brown and
                  Feng Zhu and
                  Patrick Pape and
                  Phillip Whitlow},
  title        = {Genomics Cybersecurity Concerns, Challenges, and a Modular Test Lab},
  booktitle    = {Proceedings of the 2024 {ACM} Southeast Conference, {ACM} {SE} 2024,
                  Marietta, GA, USA, April 18-20, 2024},
  pages        = {86--94},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3603287.3651215},
  doi          = {10.1145/3603287.3651215},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ACMse/SheldonRMBZPW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/PuckettLYM23,
  author       = {Steven Puckett and
                  Jianqing Liu and
                  Seong{-}Moo Yoo and
                  Thomas H. Morris},
  title        = {A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware
                  Accelerators},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {24},
  pages        = {22143--22152},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3304175},
  doi          = {10.1109/JIOT.2023.3304175},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/PuckettLYM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ncs/2021,
  editor       = {Kim{-}Kwang Raymond Choo and
                  Tommy H. Morris and
                  Gilbert L. Peterson and
                  Eric S. Imsand},
  title        = {National Cyber Summit {(NCS)} Research Track 2021, Huntsville, AL,
                  USA, September 28-30, 2021},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {310},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-84614-5},
  doi          = {10.1007/978-3-030-84614-5},
  isbn         = {978-3-030-84613-8},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ncs/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/AlimWM21,
  author       = {Mohammad E. Alim and
                  Shelton R. Wright and
                  Tommy H. Morris},
  title        = {A Laboratory-Scale Canal {SCADA} System Testbed for Cybersecurity
                  Research},
  booktitle    = {3rd {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta,
                  GA, USA, December 13-15, 2021},
  pages        = {348--354},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TPSISA52974.2021.00038},
  doi          = {10.1109/TPSISA52974.2021.00038},
  timestamp    = {Thu, 21 Apr 2022 16:21:01 +0200},
  biburl       = {https://dblp.org/rec/conf/tpsisa/AlimWM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ncs/2020,
  editor       = {Kim{-}Kwang Raymond Choo and
                  Tommy H. Morris and
                  Gilbert L. Peterson and
                  Eric S. Imsand},
  title        = {National Cyber Summit {(NCS)} Research Track 2020, Huntsville, AL,
                  USA, June 2-4, 2020},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1271},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-58703-1},
  doi          = {10.1007/978-3-030-58703-1},
  isbn         = {978-3-030-58702-4},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ncs/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ncs/2019,
  editor       = {Kim{-}Kwang Raymond Choo and
                  Thomas H. Morris and
                  Gilbert L. Peterson},
  title        = {National Cyber Summit, {NCS} 2019, Research Track, Huntsville, AL,
                  USA, 4-6 June, 2019},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1055},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-31239-8},
  doi          = {10.1007/978-3-030-31239-8},
  isbn         = {978-3-030-31238-1},
  timestamp    = {Sun, 19 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ncs/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccel/TalukderKRMR19,
  author       = {Bashir M. Sabquat Bahar Talukder and
                  Joseph Kerns and
                  Biswajit Ray and
                  Thomas H. Morris and
                  Md. Tauhidur Rahman},
  title        = {Exploiting {DRAM} Latency Variations for Generating True Random Numbers},
  booktitle    = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2019,
                  Las Vegas, NV, USA, January 11-13, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCE.2019.8662060},
  doi          = {10.1109/ICCE.2019.8662060},
  timestamp    = {Wed, 15 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccel/TalukderKRMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ncs/GriffithM19,
  author       = {SueAnne Griffith and
                  Thomas H. Morris},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Thomas H. Morris and
                  Gilbert L. Peterson},
  title        = {Using Modeled Cyber-Physical Systems for Independent Review of Intrusion
                  Detection Systems},
  booktitle    = {National Cyber Summit, {NCS} 2019, Research Track, Huntsville, AL,
                  USA, 4-6 June, 2019},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1055},
  pages        = {116--125},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31239-8\_10},
  doi          = {10.1007/978-3-030-31239-8\_10},
  timestamp    = {Sun, 19 Jul 2020 19:11:29 +0200},
  biburl       = {https://dblp.org/rec/conf/ncs/GriffithM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ncs/WerthM19,
  author       = {Aaron Werth and
                  Thomas H. Morris},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Thomas H. Morris and
                  Gilbert L. Peterson},
  title        = {A Specification-Based Intrusion Prevention System for Malicious Payloads},
  booktitle    = {National Cyber Summit, {NCS} 2019, Research Track, Huntsville, AL,
                  USA, 4-6 June, 2019},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1055},
  pages        = {153--168},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31239-8\_13},
  doi          = {10.1007/978-3-030-31239-8\_13},
  timestamp    = {Sun, 19 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ncs/WerthM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlvesDWM18,
  author       = {Thiago Alves and
                  Rishabh Das and
                  Aaron Werth and
                  Thomas H. Morris},
  title        = {Virtualization of {SCADA} testbeds for cybersecurity research: {A}
                  modular approach},
  journal      = {Comput. Secur.},
  volume       = {77},
  pages        = {531--546},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.05.002},
  doi          = {10.1016/J.COSE.2018.05.002},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/AlvesDWM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlvesM18,
  author       = {Thiago Alves and
                  Thomas H. Morris},
  title        = {OpenPLC: An {IEC} 61, 131-3 compliant open source industrial controller
                  for cyber security research},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {364--379},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.007},
  doi          = {10.1016/J.COSE.2018.07.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlvesM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/esl/AlvesDM18,
  author       = {Thiago Alves and
                  Rishabh Das and
                  Thomas H. Morris},
  title        = {Embedding Encryption and Machine Learning Intrusion Prevention Systems
                  on Programmable Logic Controllers},
  journal      = {{IEEE} Embed. Syst. Lett.},
  volume       = {10},
  number       = {3},
  pages        = {99--102},
  year         = {2018},
  url          = {https://doi.org/10.1109/LES.2018.2823906},
  doi          = {10.1109/LES.2018.2823906},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/esl/AlvesDM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/AdhikariMP18,
  author       = {Uttam Adhikari and
                  Thomas H. Morris and
                  Shengyi Pan},
  title        = {Applying Non-Nested Generalized Exemplars Classification for Cyber-Power
                  Event and Intrusion Detection},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {9},
  number       = {5},
  pages        = {3928--3941},
  year         = {2018},
  url          = {https://doi.org/10.1109/TSG.2016.2642787},
  doi          = {10.1109/TSG.2016.2642787},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/AdhikariMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/AdhikariMP18a,
  author       = {Uttam Adhikari and
                  Thomas H. Morris and
                  Shengyi Pan},
  title        = {Applying Hoeffding Adaptive Trees for Real-Time Cyber-Power Event
                  and Intrusion Classification},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {9},
  number       = {5},
  pages        = {4049--4060},
  year         = {2018},
  url          = {https://doi.org/10.1109/TSG.2017.2647778},
  doi          = {10.1109/TSG.2017.2647778},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/AdhikariMP18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccel/Lingasubramanian18,
  author       = {Karthikeyan Lingasubramanian and
                  Ranveer Kumar and
                  Nagendra Babu Gunti and
                  Thomas H. Morris},
  title        = {Study of hardware trojans based security vulnerabilities in cyber
                  physical systems},
  booktitle    = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2018,
                  Las Vegas, NV, USA, January 12-14, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCE.2018.8326180},
  doi          = {10.1109/ICCE.2018.8326180},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccel/Lingasubramanian18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/AlvesM18,
  author       = {Thiago Alves and
                  Thomas H. Morris},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Hardware-based Cyber Threats},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {259--266},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006577202590266},
  doi          = {10.5220/0006577202590266},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/AlvesM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/DasM18,
  author       = {Rishabh Das and
                  Thomas H. Morris},
  editor       = {Jason Staggs and
                  Sujeet Shenoi},
  title        = {Modeling a Midstream Oil Terminal for Cyber Security Risk Evaluation},
  booktitle    = {Critical Infrastructure Protection {XII} - 12th {IFIP} {WG} 11.10
                  International Conference, {ICCIP} 2018, Arlington, VA, USA, March
                  12-14, 2018, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {542},
  pages        = {149--175},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04537-1\_9},
  doi          = {10.1007/978-3-030-04537-1\_9},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/DasM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icss2/2018,
  editor       = {Sajal Bhatia and
                  Alvaro A. C{\'{a}}rdenas and
                  Ernest Foo and
                  Marina Krotofil and
                  Sye Loong Keoh and
                  Thomas Locher and
                  Daisuke Mashima and
                  Tommy H. Morris and
                  John Mulder and
                  Stephen McLaughlin and
                  Igor Nai Fovino and
                  Julian L. Rrushi and
                  Bradley L. Schatz and
                  Jared Smith and
                  Saman A. Zonouz and
                  Tim Zimmerman},
  title        = {Proceedings of the 4th Annual Industrial Control System Security Workshop,
                  {ICSS} 2018, San Juan, PR, USA, December 4, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://dl.acm.org/citation.cfm?id=3295453},
  isbn         = {978-1-4503-6220-7},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icss2/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-02068,
  author       = {Bashir M. Sabquat Bahar Talukder and
                  Joseph Kerns and
                  Biswajit Ray and
                  Thomas H. Morris and
                  Md. Tauhidur Rahman},
  title        = {Exploiting {DRAM} Latency Variations for Generating True Random Numbers},
  journal      = {CoRR},
  volume       = {abs/1808.02068},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.02068},
  eprinttype    = {arXiv},
  eprint       = {1808.02068},
  timestamp    = {Wed, 15 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-02068.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ShermanDCCMOSTV17,
  author       = {Alan T. Sherman and
                  Melissa Dark and
                  Agnes H. Chan and
                  Rylan Chong and
                  Thomas H. Morris and
                  Linda Oliva and
                  John A. Springer and
                  Bhavani Thuraisingham and
                  Christopher Vatcher and
                  Rakesh M. Verma and
                  Susanne Wetzel},
  title        = {INSuRE: Collaborating Centers of Academic Excellence Engage Students
                  in Cybersecurity Research},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {4},
  pages        = {72--78},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.3151327},
  doi          = {10.1109/MSP.2017.3151327},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ShermanDCCMOSTV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/AdhikariMP17,
  author       = {Uttam Adhikari and
                  Thomas H. Morris and
                  Shengyi Pan},
  title        = {{WAMS} Cyber-Physical Test Bed for Power System, Cybersecurity Study,
                  and Data Mining},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {8},
  number       = {6},
  pages        = {2744--2753},
  year         = {2017},
  url          = {https://doi.org/10.1109/TSG.2016.2537210},
  doi          = {10.1109/TSG.2016.2537210},
  timestamp    = {Sun, 22 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/AdhikariMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/0001MY17,
  author       = {Thiago Alves and
                  Thomas H. Morris and
                  Seong{-}Moo Yoo},
  title        = {Securing {SCADA} Applications Using OpenPLC With End-To-End Encryption},
  booktitle    = {Proceedings of the 3rd Annual Industrial Control System Security Workshop,
                  {ICSS} 2017, San Juan, PR, USA, December 05-05, 2017},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3174776.3174777},
  doi          = {10.1145/3174776.3174777},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icss2/0001MY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShermanDCCMOSTV17,
  author       = {Alan T. Sherman and
                  Melissa Dark and
                  Agnes H. Chan and
                  Rylan Chong and
                  Thomas H. Morris and
                  Linda Oliva and
                  John A. Springer and
                  Bhavani Thuraisingham and
                  Christopher Vatcher and
                  Rakesh M. Verma and
                  Susanne Wetzel},
  title        = {The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity
                  Research},
  journal      = {CoRR},
  volume       = {abs/1703.08859},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.08859},
  eprinttype    = {arXiv},
  eprint       = {1703.08859},
  timestamp    = {Wed, 26 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShermanDCCMOSTV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/ChenTAMS16,
  author       = {Qian Chen and
                  Madhulika Trivedi and
                  Sherif Abdelwahed and
                  Thomas H. Morris and
                  Frederick T. Sheldon},
  title        = {Model-based autonomic security management for cyber-physical infrastructures},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {12},
  number       = {4},
  pages        = {273--294},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJCIS.2016.10002316},
  doi          = {10.1504/IJCIS.2016.10002316},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcritis/ChenTAMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/VaughnM16,
  author       = {Rayford B. Vaughn Jr. and
                  Tommy H. Morris},
  editor       = {Joseph P. Trien and
                  Stacy J. Prowell and
                  John R. Goodall and
                  Robert A. Bridges},
  title        = {Addressing Critical Industrial Control System Cyber Security Concerns
                  via High Fidelity Simulation},
  booktitle    = {Proceedings of the 11th Annual Cyber and Information Security Research
                  Conference, {CISRC} 2016, Oak Ridge, TN, USA, April 5-7, 2016},
  pages        = {12:1--12:4},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897795.2897819},
  doi          = {10.1145/2897795.2897819},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/VaughnM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icss2/0001DM16,
  author       = {Thiago Alves and
                  Rishabh Das and
                  Thomas H. Morris},
  title        = {Virtualization of Industrial Control System Testbeds for Cybersecurity},
  booktitle    = {Proceedings of the 2nd Annual Industrial Control System Security Workshop,
                  {ICSS} 2016, Los Angeles, CA, USA, December 6, 2016},
  pages        = {10--14},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3018981.3018988},
  doi          = {10.1145/3018981.3018988},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icss2/0001DM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/PanMA15,
  author       = {Shengyi Pan and
                  Thomas H. Morris and
                  Uttam Adhikari},
  title        = {A Specification-based Intrusion Detection Framework for Cyber-physical
                  Environment in Electric Power System},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {174--188},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p174-188.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/PanMA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/PanMA15,
  author       = {Shengyi Pan and
                  Thomas H. Morris and
                  Uttam Adhikari},
  title        = {Classification of Disturbances and Cyber-Attacks in Power Systems
                  Using Heterogeneous Time-Synchronized Data},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {11},
  number       = {3},
  pages        = {650--662},
  year         = {2015},
  url          = {https://doi.org/10.1109/TII.2015.2420951},
  doi          = {10.1109/TII.2015.2420951},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/PanMA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/PanMA15,
  author       = {Shengyi Pan and
                  Thomas H. Morris and
                  Uttam Adhikari},
  title        = {Developing a Hybrid Intrusion Detection System Using Data Mining for
                  Power Systems},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {6},
  number       = {6},
  pages        = {3104--3113},
  year         = {2015},
  url          = {https://doi.org/10.1109/TSG.2015.2409775},
  doi          = {10.1109/TSG.2015.2409775},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/PanMA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/ThorntonM15,
  author       = {Zach Thornton and
                  Thomas H. Morris},
  editor       = {Mason Rice and
                  Sujeet Shenoi},
  title        = {Enhancing a Virtual {SCADA} Laboratory Using Simulink},
  booktitle    = {Critical Infrastructure Protection {IX} - 9th {IFIP} 11.10 International
                  Conference, {ICCIP} 2015, Arlington, VA, USA, March 16-18, 2015, Revised
                  Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {466},
  pages        = {119--133},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26567-4\_8},
  doi          = {10.1007/978-3-319-26567-4\_8},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/ThorntonM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/GaoM14,
  author       = {Wei Gao and
                  Thomas H. Morris},
  title        = {On Cyber Attacks and Signature Based Intrusion Detection for {MODBUS}
                  Based Industrial Control Systems},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {1},
  pages        = {37--56},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1162},
  doi          = {10.15394/JDFSL.2014.1162},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/GaoM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/MorrisG14,
  author       = {Thomas H. Morris and
                  Wei Gao},
  editor       = {Jonathan Butts and
                  Sujeet Shenoi},
  title        = {Industrial Control System Traffic Data Sets for Intrusion Detection
                  Research},
  booktitle    = {Critical Infrastructure Protection {VIII} - 8th {IFIP} {WG} 11.10
                  International Conference, {ICCIP} 2014, Arlington, VA, USA, March
                  17-19, 2014, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {441},
  pages        = {65--78},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45355-1\_5},
  doi          = {10.1007/978-3-662-45355-1\_5},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/MorrisG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/SrivastavaMEVPA13,
  author       = {Anurag Srivastava and
                  Thomas H. Morris and
                  Timothy Ernster and
                  Ceeman Vellaithurai and
                  Shengyi Pan and
                  Uttam Adhikari},
  title        = {Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete
                  Information},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {4},
  number       = {1},
  pages        = {235--244},
  year         = {2013},
  url          = {https://doi.org/10.1109/TSG.2012.2232318},
  doi          = {10.1109/TSG.2012.2232318},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/SrivastavaMEVPA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/MorrisVS13,
  author       = {Thomas H. Morris and
                  Rayford B. Vaughn and
                  Elena Sitnikova},
  editor       = {Clark D. Thomborson and
                  Udaya Parampalli},
  title        = {Advances in the Protection of Critical Infrastructure by Improvement
                  in Industrial Control System Security},
  booktitle    = {Eleventh Australasian Information Security Conference, {AISC} 2013,
                  Adelaide, Australia, February 2013},
  series       = {{CRPIT}},
  volume       = {138},
  pages        = {67--76},
  publisher    = {Australian Computer Society},
  year         = {2013},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Morris.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/MorrisVS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/VaughnMS13,
  author       = {Rayford B. Vaughn and
                  Thomas H. Morris and
                  Elena Sitnikova},
  editor       = {Frederick T. Sheldon and
                  Annarita Giani and
                  Axel W. Krings and
                  Robert K. Abercrombie},
  title        = {Development {\&} expansion of an industrial control system security
                  laboratory and an international research collaboration},
  booktitle    = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
                  TN, USA, January 8-10, 2013},
  pages        = {18},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2459976.2459997},
  doi          = {10.1145/2459976.2459997},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/VaughnMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/PanMAM13,
  author       = {Shengyi Pan and
                  Thomas H. Morris and
                  Uttam Adhikari and
                  Vahid Madani},
  editor       = {Frederick T. Sheldon and
                  Annarita Giani and
                  Axel W. Krings and
                  Robert K. Abercrombie},
  title        = {Causal event graphs cyber-physical system intrusion detection system},
  booktitle    = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
                  TN, USA, January 8-10, 2013},
  pages        = {40},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2459976.2460022},
  doi          = {10.1145/2459976.2460022},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/PanMAM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/SpraberyMPAM13,
  author       = {Read Sprabery and
                  Thomas H. Morris and
                  Shengyi Pan and
                  Uttam Adhikari and
                  Vahid Madani},
  editor       = {Frederick T. Sheldon and
                  Annarita Giani and
                  Axel W. Krings and
                  Robert K. Abercrombie},
  title        = {Protocol mutation intrusion detection for synchrophasor communications},
  booktitle    = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
                  TN, USA, January 8-10, 2013},
  pages        = {41},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2459976.2460023},
  doi          = {10.1145/2459976.2460023},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/SpraberyMPAM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/SheldonFMHGMDKW13,
  author       = {Frederick T. Sheldon and
                  Daniel Fetzer and
                  David O. Manz and
                  Jingshan Huang and
                  Stuart Goose and
                  Thomas H. Morris and
                  Jiangbo Dang and
                  Jonathan Kirsch and
                  Dong Wei},
  editor       = {Frederick T. Sheldon and
                  Annarita Giani and
                  Axel W. Krings and
                  Robert K. Abercrombie},
  title        = {Intrinsically resilient energy control systems},
  booktitle    = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
                  TN, USA, January 8-10, 2013},
  pages        = {63},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2459976.2460046},
  doi          = {10.1145/2459976.2460046},
  timestamp    = {Thu, 30 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/SheldonFMHGMDKW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/MorrisJVD13,
  author       = {Thomas H. Morris and
                  Bryan A. Jones and
                  Rayford B. Vaughn and
                  Yoginder S. Dandass},
  title        = {Deterministic Intrusion Detection Rules for {MODBUS} Protocols},
  booktitle    = {46th Hawaii International Conference on System Sciences, {HICSS} 2013,
                  Wailea, HI, USA, January 7-10, 2013},
  pages        = {1773--1781},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/HICSS.2013.174},
  doi          = {10.1109/HICSS.2013.174},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/MorrisJVD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ics-csr/MorrisG13,
  author       = {Thomas H. Morris and
                  Wei Gao},
  editor       = {Helge Janicke and
                  Kevin I. Jones},
  title        = {Industrial Control System Cyber Attacks},
  booktitle    = {1st International Symposium for {ICS} {\&} {SCADA} Cyber Security
                  Research 2013, {ICS-CSR} 2013, 16-17 September 2013, Leicester, {UK}},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2013},
  url          = {http://ewic.bcs.org/content/ConWebDoc/51165},
  timestamp    = {Thu, 25 Aug 2016 11:36:27 +0200},
  biburl       = {https://dblp.org/rec/conf/ics-csr/MorrisG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ReavesM12,
  author       = {Bradley Reaves and
                  Thomas H. Morris},
  title        = {Analysis and mitigation of vulnerabilities in short-range wireless
                  communications for industrial control systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {3-4},
  pages        = {154--174},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.10.001},
  doi          = {10.1016/J.IJCIP.2012.10.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ReavesM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ReavesM12,
  author       = {Bradley Reaves and
                  Thomas H. Morris},
  title        = {An open virtual testbed for industrial control system security research},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {4},
  pages        = {215--229},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0164-7},
  doi          = {10.1007/S10207-012-0164-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ReavesM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/MorrisVD12,
  author       = {Thomas H. Morris and
                  Rayford B. Vaughn and
                  Yoginder S. Dandass},
  title        = {A Retrofit Network Intrusion Detection System for {MODBUS} {RTU} and
                  {ASCII} Industrial Control Systems},
  booktitle    = {45th Hawaii International International Conference on Systems Science
                  {(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui,
                  HI, {USA}},
  pages        = {2338--2345},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/HICSS.2012.78},
  doi          = {10.1109/HICSS.2012.78},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/MorrisVD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stids/SheldonHDFGKMMW12,
  author       = {Frederick T. Sheldon and
                  Jingshan Huang and
                  Jiangbo Dang and
                  Daniel Fetzer and
                  Stuart Goose and
                  Jonathan Kirsch and
                  David O. Manz and
                  Thomas H. Morris and
                  Dong Wei},
  editor       = {Paulo Cesar G. da Costa and
                  Kathryn B. Laskey},
  title        = {Intrinsically Resilient Energy Control Systems},
  booktitle    = {Proceedings of the Seventh International Conference on Semantic Technologies
                  for Intelligence, Defense, and Security, Fairfax, VA, USA, October
                  23-26, 2012},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {966},
  pages        = {96--103},
  publisher    = {CEUR-WS.org},
  year         = {2012},
  url          = {https://ceur-ws.org/Vol-966/STIDS2012\_T12\_SheldonEtAl\_ResilientEnergySystems.pdf},
  timestamp    = {Thu, 30 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stids/SheldonHDFGKMMW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/MorrisSRGPR11,
  author       = {Thomas H. Morris and
                  Anurag Srivastava and
                  Bradley Reaves and
                  Wei Gao and
                  Kalyan Pavurapu and
                  Ram Reddi},
  title        = {A control system testbed to validate critical infrastructure protection
                  concepts},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {2},
  pages        = {88--103},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.06.005},
  doi          = {10.1016/J.IJCIP.2011.06.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/MorrisSRGPR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MorrisPLMYKFM11,
  author       = {Thomas H. Morris and
                  Shengyi Pan and
                  Jeremy Lewis and
                  Jonathan Moorhead and
                  Nicolas H. Younan and
                  Roger L. King and
                  Mark Freund and
                  Vahid Madani},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Cybersecurity risk testing of substation phasor measurement units
                  and phasor data concentrators},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {24},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179324},
  doi          = {10.1145/2179298.2179324},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/MorrisPLMYKFM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MorrisVD11,
  author       = {Thomas H. Morris and
                  Rayford B. Vaughn and
                  Yoginder S. Dandass},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A testbed for {SCADA} control system cybersecurity research and pedagogy},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {27},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179327},
  doi          = {10.1145/2179298.2179327},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/MorrisVD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/MorrisN10,
  author       = {Thomas H. Morris and
                  V. S. S. Nair},
  title        = {Private computing on public platforms: portable application security},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {10},
  number       = {7},
  pages        = {942--958},
  year         = {2010},
  url          = {https://doi.org/10.1002/wcm.804},
  doi          = {10.1002/WCM.804},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/MorrisN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/GaoMRR10,
  author       = {Wei Gao and
                  Thomas H. Morris and
                  Bradley Reaves and
                  Drew Richey},
  title        = {On {SCADA} control system command and response injection and intrusion
                  detection},
  booktitle    = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October
                  18-20, 2010},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ecrime.2010.5706699},
  doi          = {10.1109/ECRIME.2010.5706699},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/GaoMRR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/ReavesM09,
  author       = {Bradley Reaves and
                  Thomas H. Morris},
  title        = {Discovery, infiltration, and denial of service in a process control
                  system wireless network},
  booktitle    = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October
                  20-21, 2009},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ECRIME.2009.5342612},
  doi          = {10.1109/ECRIME.2009.5342612},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/ReavesM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/MorrisN09,
  author       = {Thomas H. Morris and
                  V. S. S. Nair},
  title        = {Encryption Key Protection for Private Computing on Public Platforms},
  booktitle    = {Seventh Annual {IEEE} International Conference on Pervasive Computing
                  and Communications - Workshops (PerCom Workshops 2009), 9-13 March
                  2009, Galveston, TX, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/PERCOM.2009.4912897},
  doi          = {10.1109/PERCOM.2009.4912897},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/MorrisN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MorrisN08,
  author       = {Thomas H. Morris and
                  V. S. S. Nair},
  title        = {Privacy Protected {ELF} for Private Computing on Public Platforms},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {452--457},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.160},
  doi          = {10.1109/ARES.2008.160},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MorrisN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/MorrisN08,
  author       = {Thomas H. Morris and
                  V. S. S. Nair},
  title        = {Secure Context Switch for Private Computing on Public Platforms},
  booktitle    = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM}
                  2008, New Orleans, LA, USA, 30 November - 4 December 2008},
  pages        = {2159--2163},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/GLOCOM.2008.ECP.416},
  doi          = {10.1109/GLOCOM.2008.ECP.416},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/MorrisN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/MorrisN07,
  author       = {Thomas H. Morris and
                  V. S. S. Nair},
  title        = {{PCPP:} On Remote Host Assessment via Naive Bayesian Classification},
  booktitle    = {21th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2007), Proceedings, 26-30 March 2007, Long Beach, California, {USA}},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/IPDPS.2007.370619},
  doi          = {10.1109/IPDPS.2007.370619},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/MorrisN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amia/RoccaKPM99,
  author       = {Mitra Rocca and
                  V. Lawrence Kudryk and
                  John C. Pajak and
                  Tommy H. Morris},
  title        = {The evolution of a teledentistry system within the Department of Defense},
  booktitle    = {{AMIA} 1999, American Medical Informatics Association Annual Symposium,
                  Washington, DC, USA, November 6-10, 1999},
  publisher    = {{AMIA}},
  year         = {1999},
  url          = {https://knowledge.amia.org/amia-55142-a1999a-1.591078/t-001-1.593353/f-001-1.593354/a-186-1.593409/a-187-1.593406},
  timestamp    = {Wed, 17 Apr 2024 11:48:49 +0200},
  biburl       = {https://dblp.org/rec/conf/amia/RoccaKPM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}