default search action
Rayford B. Vaughn
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [c39]Rayford B. Vaughn Jr., Tommy H. Morris:
Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity Simulation. CISRC 2016: 12:1-12:4 - [c38]Wm. Arthur Conklin, Rayford B. Vaughn, Gregory B. White:
Introduction to the Cybersecurity Minitrack. HICSS 2016: 2615 - 2015
- [c37]Gregory B. White, Wm. Arthur Conklin, Rayford B. Vaughn:
Introduction to the E-government Secure Cyberspace in 21st Century Government Minitrack. HICSS 2015: 2252 - 2014
- [c36]Wm. Arthur Conklin, Gregory B. White, Rayford B. Vaughn:
Introduction to Infrastructure Security Minitrack. HICSS 2014: 1986 - 2013
- [c35]Thomas H. Morris, Rayford B. Vaughn, Elena Sitnikova:
Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security. AISC 2013: 67-76 - [c34]Rayford B. Vaughn, Thomas H. Morris, Elena Sitnikova:
Development & expansion of an industrial control system security laboratory and an international research collaboration. CSIIRW 2013: 18 - [c33]Rayford B. Vaughn Jr., Wm. Arthur Conklin, Gregory B. White:
Introduction to E-Government Infrastructure Security Minitrack. HICSS 2013: 1753 - [c32]Thomas H. Morris, Bryan A. Jones, Rayford B. Vaughn, Yoginder S. Dandass:
Deterministic Intrusion Detection Rules for MODBUS Protocols. HICSS 2013: 1773-1781 - [c31]Elena Sitnikova, Ernest Foo, Rayford B. Vaughn:
The Power of Hands-On Exercises in SCADA Cyber Security Education. World Conference on Information Security Education 2013: 83-94 - 2012
- [c30]Thomas H. Morris, Rayford B. Vaughn, Yoginder S. Dandass:
A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control Systems. HICSS 2012: 2338-2345 - 2011
- [c29]Thomas H. Morris, Rayford B. Vaughn, Yoginder S. Dandass:
A testbed for SCADA control system cybersecurity research and pedagogy. CSIIRW 2011: 27 - 2010
- [j18]Alfred C. Bogen, David A. Dampier, Rayford B. Vaughn, Donna S. Reese, Edward B. Allen, Jeffrey C. Carver:
Structured Forensics Examination Planning with Domain Modeling: A Report of Three Experiment Trials. J. Digit. Forensic Pract. 3(1): 23-32 (2010) - [j17]Elaine Hulitt, Rayford B. Vaughn:
Information system security compliance to FISMA standard: a quantitative measure. Telecommun. Syst. 45(2-3): 139-152 (2010)
2000 – 2009
- 2009
- [j16]Rayford B. Vaughn, David A. Dampier:
Outreach, Teaching and Research Facilitated by a Forensics Training Center in Direct Support of Public Safety and Criminal Justice. Int. J. Comput. Their Appl. 16(2): 105-110 (2009) - [j15]Robert Wesley McGrew, Rayford B. Vaughn:
Discovering vulnerabilities in control system human-machine interface software. J. Syst. Softw. 82(4): 583-589 (2009) - [c28]Elaine Hulitt, Rayford B. Vaughn:
Information System Security Compliance to FISMA Standard: A Quantitative Measure. HAISA 2009: 82-96 - [c27]Rayford B. Vaughn, David A. Dampier:
A Discovery Learning Approach to Information Assurance Education. HICSS 2009: 1-9 - 2008
- [j14]Jack Wesley Riley, David A. Dampier, Rayford B. Vaughn:
A Comparison of Forensic Hard Drive Imagers: A Time Analysis Comparison Between the ICS Image MASSter-Solo III and the Logicube Talon. J. Digit. Forensic Pract. 2(2): 74-82 (2008) - [c26]Jack Wesley Riley, David A. Dampier, Rayford B. Vaughn:
Time Analysis of Hard Drive Imaging Tools. IFIP Int. Conf. Digital Forensics 2008: 335-344 - [c25]Elaine Hulitt, Rayford B. Vaughn:
Information system security compliance to FISMA standard: A quantitative measure. IMCSIT 2008: 799-806 - 2007
- [j13]Rayford B. Vaughn:
Leadership by example: A perspective on the influence of Barry Boehm. J. Syst. Softw. 80(8): 1222-1226 (2007) - [c24]Ambareen Siraj, Rayford B. Vaughn:
Sensor Corroboration for Anomaly Sensors in an Intrusion Detection Environment. CAINE 2007: 278-283 - [c23]Wei Li, Rayford B. Vaughn:
Efficient Update on Exploitation Graphs for Vulnerability Analysis. CAINE 2007: 295-300 - [c22]Rayford B. Vaughn, David A. Dampier:
Digital Forensics--State of the Science and Foundational Research Activity. HICSS 2007: 263 - [c21]Rayford B. Vaughn, David A. Dampier:
The Development of a University-Based Forensics Training Center as a Regional Outreach and Service Activity. HICSS 2007: 265 - [c20]Craig M. McRae, Rayford B. Vaughn:
Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate the Source of Phishing Attacks. HICSS 2007: 270 - [c19]Robert McGrew, Rayford B. Vaughn:
Using Search Engines to Acquire Network Forensic Evidence. IFIP Int. Conf. Digital Forensics 2007: 247-253 - 2006
- [j12]Craig M. McRae, Robert Wesley McGrew, Rayford B. Vaughn:
Honey Tokens and Web Bugs: Developing Reactive Techniques for Investigating Phishing Scams. J. Digit. Forensic Pract. 1(3): 193-199 (2006) - [j11]Wei Li, Rayford B. Vaughn, Yoginder S. Dandass:
An Approach to Model Network Exploitations Using Exploitation Graphs. Simul. 82(8): 523-541 (2006) - [c18]Wei Li, Rayford B. Vaughn:
Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs. CCGRID 2006: 26 - [c17]Cesar Monroy, Rayford B. Vaughn:
Keeping An Educational Network Healthy: Differentiating Malicious And Naive Students On An Educational Network Environment. Security and Management 2006: 475-481 - [c16]Wei Li, Rayford B. Vaughn:
Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering. HICSS 2006 - [c15]Robert McGrew, Rayford B. Vaughn:
Experiences with Honeypot Systems: Development, Deployment, and Analysis. HICSS 2006 - [c14]Byron J. Williams, Jeffrey C. Carver, Rayford B. Vaughn:
Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements. Software Engineering Research and Practice 2006: 966-971 - 2005
- [j10]German Florez, Zhen Liu, Susan M. Bridges, Anthony Skjellum, Rayford B. Vaughn:
Lightweight monitoring of MPI programs in real time. Concurr. Comput. Pract. Exp. 17(13): 1547-1578 (2005) - [j9]Udai Kumar Kudikyala, Rayford B. Vaughn:
Software requirement understanding using Pathfinder networks: discovering and evaluating mental models. J. Syst. Softw. 74(1): 101-108 (2005) - [c13]Ambareen Siraj, Rayford B. Vaughn:
A Cognitive Model for Alert Correlation in a Distributed Environment. ISI 2005: 218-230 - [c12]German Florez-Larrahondo, Susan M. Bridges, Rayford B. Vaughn:
Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models. ISC 2005: 506-514 - [c11]Zhen Liu, Susan M. Bridges, Rayford B. Vaughn:
Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion Detection Models. IWIA 2005: 164-177 - 2004
- [j8]Ambareen Siraj, Rayford B. Vaughn, Susan M. Bridges:
Decision Making For Network Health Assessment In An Intelligent Intrusion Detection System Architecture. Int. J. Inf. Technol. Decis. Mak. 3(2): 281-306 (2004) - [j7]German Florez, Zhen Liu, Susan Bridges, Rayford B. Vaughn, Anthony Skjellum:
Detecting Anomalies in High-Performance Parallel Programs. J. Digit. Inf. Manag. 2(2): 44-47 (2004) - [c10]Ambareen Siraj, Rayford B. Vaughn, Susan Bridges:
Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture. HICSS 2004 - [c9]German Florez, Zhen Liu, Susan Bridges, Rayford B. Vaughn, Anthony Skjellum:
Detecting Anomalies in High-Performance Parallel Programs. ITCC (2) 2004: 30-34 - 2003
- [j6]Rayford B. Vaughn:
Advances in the provisions of system and software security - Thirty years of progress. Adv. Comput. 58: 287-340 (2003) - [c8]Zhen Liu, Susan M. Bridges, Rayford B. Vaughn:
Classification of anomalous traces of privileged and parallel programs by neural networks. FUZZ-IEEE 2003: 1225-1230 - [c7]Rayford B. Vaughn, Ronda R. Henning, Ambareen Siraj:
Information Assurance Measures and Metrics - State of Practice and Proposed Taxonomy. HICSS 2003: 331 - [c6]Rayford B. Vaughn:
Panel: Teaching Undergraduate Information Assurance. World Conference on Information Security Education 2003: 173-174 - [c5]Mahmood Hossain, Susan M. Bridges, Rayford B. Vaughn Jr.:
Adaptive intrusion detection with data mining. SMC 2003: 3097-3103 - 2002
- [j5]Rayford B. Vaughn, Ronda R. Henning, Kevin L. Fox:
An empirical study of industrial security-engineering practices. J. Syst. Softw. 61(3): 225-232 (2002) - [c4]Gregory W. Hislop, Michael J. Lutz, Rayford B. Vaughn, David A. Umphress:
Panel 1: Changing Conditions for Undergraduate Software Engineering Programs. CSEE&T 2002: 250-251 - 2001
- [j4]Rayford B. Vaughn:
Teaching Industrial Practices in an Undergraduate Software Engineering Course. Comput. Sci. Educ. 11(1): 21-32 (2001) - 2000
- [c3]Rayford B. Vaughn:
A Report on Industrial Transfer of Software Engineering to the Classroom Environment. CSEE&T 2000: 15-22 - [c2]Rayford B. Vaughn:
Application of security tot he computing science classroom. SIGCSE 2000: 90-94
1990 – 1999
- 1999
- [j3]Rayford B. Vaughn, Julian E. Boggess III:
Integration of computer security into the software engineering and computer science programs. J. Syst. Softw. 49(2-3): 149-153 (1999) - [c1]Ron Ross, Cynthia E. Irvine, Charles Reynolds, Ravi S. Sandhu, Blaine Burnham, Rayford B. Vaughn:
Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum). ACSAC 1999: 265- - 1994
- [j2]Rayford B. Vaughn, Hossein Saiedian, Elizabeth A. Unger:
A Proposed Mechanism for Implementation of Non-Discretionary Access Controls in a Network Environment. Comput. Networks ISDN Syst. 26(12): 1523-1531 (1994) - 1993
- [j1]Rayford B. Vaughn, Hossein Saiedian, Elizabeth A. Unger:
A survey of security issues in office computation and the application of secure computing models to office systems. Comput. Secur. 12(1): 79-97 (1993)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint