Automated security patch and vulnerability remediation tool for electric utilities Q Li, F Zhang, P Huff US Patent App. 16/150,042, 2019 | 43 | 2019 |
A recommender system for tracking vulnerabilities P Huff, K McClanahan, T Le, Q Li Proceedings of the 16th International Conference on Availability …, 2021 | 20 | 2021 |
A machine learning-based approach for automated vulnerability remediation analysis F Zhang, P Huff, K McClanahan, Q Li 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 19 | 2020 |
Towards automated assessment of vulnerability exposures in security operations P Huff, Q Li Security and Privacy in Communication Networks: 17th EAI International …, 2021 | 8 | 2021 |
Improving the efficiency of capture-resistant biometric authentication based on set intersection X Wang, PD Huff, BC Tjaden 2008 Annual Computer Security Applications Conference (ACSAC), 140-149, 2008 | 5 | 2008 |
Assessment of the distributed ledger technology for energy sector industrial and operational applications using the mitre att&ck® ics matrix A Lee, SNG Gourisetti, DJ Sebastian-Cardenas, K Lambert, V Navarro, ... IEEE Access 11, 69854-69883, 2023 | 4 | 2023 |
HELOT–Hunting Evil Life in Operational Technology S Akailvi, U Gautam, P Bhandari, H Rashid, PD Huff, JP Springer IEEE Transactions on Smart Grid 14 (4), 3058-3071, 2022 | 4 | 2022 |
A distributed ledger for non-attributable cyber threat intelligence exchange P Huff, Q Li Security and Privacy in Communication Networks: 17th EAI International …, 2021 | 4 | 2021 |
Cyber arena: an open-source solution for scalable cybersecurity labs in the cloud P Huff, S Leiterman, JP Springer Proceedings of the 54th ACM Technical Symposium on Computer Science …, 2023 | 3 | 2023 |
Assessing Cybersecurity Resilience of Distributed Ledger Technology in Energy Sector Using the MITRE ATT&CK® ICS Framework SNG Gourisetti, A Lee, R Reddi, K Isirova, M Touhiduzzaman, ... 2022 IEEE 1st Global Emerging Technology Blockchain Forum: Blockchain …, 2022 | 2 | 2022 |
Fuzzy Extractors Using an Improved Set Intersection Function PD Huff Technical Report, James Madison University, Computer Science, USA, 2008 | 2 | 2008 |
Privacy in the Digital Age: Navigating the Risks and Benefits of Cybersecurity Measures C Farnell, P Huff, W Cox Human Privacy in Virtual and Physical Worlds: Multidisciplinary Perspectives …, 2024 | | 2024 |
Towards Automating the Assessment of Software Vulnerability Risk PD Huff, Q Li EAI Endorsed Transactions on Security and Safety 8 (27), e3, 2020 | | 2020 |