Follow
Frederick T. Sheldon
Title
Cited by
Cited by
Year
Blockchain: properties and misconceptions
D Conte de Leon, AQ Stalick, AA Jillepalli, MA Haney, FT Sheldon
Asia Pacific Journal of Innovation and Entrepreneurship 11 (3), 286-300, 2017
2252017
Metrics for maintainability of class inheritance hierarchies
FT Sheldon, K Jerath, H Chung
Journal of Software Maintenance and Evolution: Research and Practice 14 (3 …, 2002
1122002
IoT intrusion detection using machine learning with a novel high performing feature selection method
K Albulayhi, Q Abu Al-Haija, SA Alsuhibany, AA Jillepalli, ...
Applied Sciences 12 (10), 5015, 2022
1062022
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning
M Ashrafuzzaman, S Das, Y Chakhchoukh, S Shiva, FT Sheldon
Computers & Security 97, 101994, 2020
1052020
A survey of crypto ransomware attack detection methodologies: an evolving outlook
A Alqahtani, FT Sheldon
Sensors 22 (5), 1837, 2022
942022
Detecting stealthy false data injection attacks in power grids using deep learning
M Ashrafuzzaman, Y Chakhchoukh, AA Jillepalli, PT Tosic, DC de Leon, ...
2018 14th International Wireless Communications & Mobile Computing …, 2018
852018
IoT intrusion detection taxonomy, reference architecture, and analyses
K Albulayhi, AA Smadi, FT Sheldon, RK Abercrombie
Sensors 21 (19), 6432, 2021
842021
Reliability measurement: From theory to practice
FT Sheldon, KM Kavi, RC Tausworthe, JT Yu, R Brettschneider, ...
IEEE Software 9 (4), 13-20, 1992
791992
Quantifying security threats and their potential impacts: a case study
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Innovations in Systems and Software Engineering 6, 269-281, 2010
742010
A methodology to evaluate agent oriented software engineering techniques
CE Lin, KM Kavi, FT Sheldon, KM Daley, RK Abercrombie
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
702007
The insecurity of wireless networks
FT Sheldon, JM Weber, SM Yoo, WD Pan
IEEE Security & Privacy 10 (4), 54-61, 2012
642012
Network intrusion detection and comparative analysis using ensemble machine learning and feature selection
S Das, S Saha, AT Priyoti, EK Roy, FT Sheldon, A Haque, S Shiva
IEEE transactions on network and service management 19 (4), 4821-4833, 2021
532021
Isaac: The idaho cps smart grid cybersecurity testbed
IA Oyewumi, AA Jillepalli, P Richardson, M Ashrafuzzaman, BK Johnson, ...
2019 IEEE Texas Power and Energy Conference (TPEC), 1-6, 2019
512019
Access control in fog computing: Challenges and research agenda
MA Aleisa, A Abuhussein, FT Sheldon
IEEE Access 8, 83986-83999, 2020
472020
Empirical evaluation of the ensemble framework for feature selection in ddos attack
S Das, D Venugopal, S Shiva, FT Sheldon
2020 7th IEEE International Conference on Cyber Security and Cloud Computing …, 2020
462020
Methodology for evaluating security controls based on key performance indicators and stakeholder mission
FT Sheldon, RK Abercrombie, A Mili
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
462009
A short survey on quantum computers
Y Kanamori, SM Yoo, WD Pan, FT Sheldon
International Journal of Computers and Applications 28 (3), 227-233, 2006
462006
A data integrity verification scheme in mobile cloud computing
C Lin, Z Shen, Q Chen, FT Sheldon
journal of Network and Computer Applications 77, 146-151, 2017
412017
Cyberspace security system
RK Abercrombie, FT Sheldon, EM Ferragut
US Patent 8,762,188, 2014
402014
Defining and computing a value based cyber-security measure
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Proceedings of the Second Kuwait Conference on e-Services and e-Systems, 1-9, 2011
402011
The system can't perform the operation now. Try again later.
Articles 1–20