default search action
Stacy J. Prowell
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c17]William A. Johnson, John Housley, Sheikh K. Ghafoor, Stacy J. Prowell:
Toward Profiling IoT Processes for Remote Service Attestation. ISPDC 2024: 1-8 - 2022
- [c16]Farzana Ahamed Bhuiyan, Stacy J. Prowell, Hossain Shahriar, Fan Wu, Akond Rahman:
Shifting Left for Machine Learning: An Empirical Study of Security Weaknesses in Supervised Learning-based Projects. COMPSAC 2022: 798-808 - 2021
- [j9]William A. Johnson, Sheikh K. Ghafoor, Stacy J. Prowell:
A Taxonomy and Review of Remote Attestation Schemes in Embedded Systems. IEEE Access 9: 142390-142410 (2021)
2010 – 2019
- 2019
- [j8]Himanshu Thapliyal, Saraju P. Mohanty, Stacy J. Prowell:
Emerging Paradigms in Vehicular Cybersecurity. IEEE Consumer Electron. Mag. 8(6): 81-83 (2019) - [j7]Carson Labrado, Himanshu Thapliyal, Stacy J. Prowell, P. Teja Kuruganti:
Use of Thermistor Temperature Sensors for Cyber-Physical System Security. Sensors 19(18): 3905 (2019) - 2018
- [c15]Rima Asmar Awad, Saeed Beztchi, Jared M. Smith, J. Bryan Lyles, Stacy J. Prowell:
Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems. ICSS 2018: 1-8 - [c14]Robert A. Bridges, Jarilyn Hernández Jiménez, Jeffrey Nichols, Katerina Goseva-Popstojanova, Stacy J. Prowell:
Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics. TrustCom/BigDataSE 2018: 1680-1684 - [i2]Robert A. Bridges, Jarilyn M. Hernández Jiménez, Jeffrey Nichols, Katerina Goseva-Popstojanova, Stacy J. Prowell:
Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics (Extended Version). CoRR abs/1805.06541 (2018) - 2017
- [c13]Michael Roy Moore, Robert A. Bridges, Frank L. Combs, Michael S. Starr, Stacy J. Prowell:
Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection. CISRC 2017: 11:1-11:4 - [e4]Joseph P. Trien, Stacy J. Prowell, John R. Goodall, Justin M. Beaver, Robert A. Bridges:
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, CISRC 2017, Oak Ridge, TN, USA, April 4 - 6, 2017. ACM 2017, ISBN 978-1-4503-4855-3 [contents] - [i1]Jarilyn M. Hernández Jiménez, Jeffrey A. Nichols, Katerina Goseva-Popstojanova, Stacy J. Prowell, Robert A. Bridges:
Malware Detection on General-Purpose Computers Using Power Consumption Monitoring: A Proof of Concept and Case Study. CoRR abs/1705.01977 (2017) - 2016
- [e3]Joseph P. Trien, Stacy J. Prowell, John R. Goodall, Robert A. Bridges:
Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016, Oak Ridge, TN, USA, April 5-7, 2016. ACM 2016, ISBN 978-1-4503-3752-6 [contents] - 2015
- [c12]Jarilyn M. Hernández, Aaron E. Ferber, Stacy J. Prowell, Lee M. Hively:
Phase-Space Detection of Cyber Events. CISR 2015: 13:1-13:4 - [e2]Joseph P. Trien, Stacy J. Prowell, Robert A. Bridges, John R. Goodall:
Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015. ACM 2015, ISBN 978-1-4503-3345-0 [contents] - 2013
- [c11]Jarilyn M. Hernández, Line Pouchard, Jeffrey Todd McDonald, Stacy J. Prowell:
Developing a power measurement framework for cyber defense. CSIIRW 2013: 28 - [c10]Richard C. Linger, Mark G. Pleszkoch, Stacy J. Prowell, Kirk Sayre, T. Scott Ankrum:
Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration. CSIIRW 2013: 43 - 2012
- [c9]Mark G. Pleszkoch, Richard C. Linger, Stacy J. Prowell, Kirk Sayre, Luanne Burns:
Automated Behavior Computation for Software Analysis and Validation. HICSS 2012: 5537-5545 - [c8]Stacy J. Prowell, Mark G. Pleszkoch, Kirk Sayre, Richard C. Linger:
Automated vulnerability detection for compiled smart grid software. ISGT 2012: 1-5 - 2011
- [c7]Richard C. Linger, Mark G. Pleszkoch, Stacy J. Prowell, Kirk Sayre:
Behavior computation for smart grid software analysis. CSIIRW 2011: 51 - 2010
- [j6]Lan Lin, Stacy J. Prowell, Jesse H. Poore:
An axiom system for sequence-based specification. Theor. Comput. Sci. 411(2): 360-376 (2010) - [e1]Frederick T. Sheldon, Stacy J. Prowell, Robert K. Abercrombie, Axel W. Krings:
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2010, Oak Ridge, TN, USA, April 21-23, 2010. ACM 2010, ISBN 978-1-4503-0017-9 [contents]
2000 – 2009
- 2009
- [j5]Lan Lin, Stacy J. Prowell, Jesse H. Poore:
The impact of requirements changes on specifications and state machines. Softw. Pract. Exp. 39(6): 573-610 (2009) - [c6]Richard C. Linger, Stacy J. Prowell, Kirk Sayre:
Computing the behavior of malicious code with function extraction technology. CSIIRW 2009: 36 - 2007
- [c5]Ali Mili, Tim Daly, Mark G. Pleszkoch, Stacy J. Prowell:
A Semantic Recognizer Infrastructure for Computing Loop Behavior. HICSS 2007: 277 - 2005
- [c4]Stacy J. Prowell:
Using Markov Chain Usage Models to Test Complex Systems. HICSS 2005 - [c3]Frederick T. Sheldon, Stephen Gordon Batsell, Stacy J. Prowell, Michael A. Langston:
Position Statement: Methodology to Support Dependable Survivable Cyber-Secure Infrastructures. HICSS 2005 - 2004
- [j4]Stacy J. Prowell, Jesse H. Poore:
Computing system reliability using Markov chain usage models. J. Syst. Softw. 73: 219-225 (2004) - [c2]Stacy J. Prowell:
A Cost-Benefit Stopping Criterion for Statistical Testing. HICSS 2004 - 2003
- [j3]Stacy J. Prowell, Jesse H. Poore:
Foundations of Sequence-Based Software Specification. IEEE Trans. Software Eng. 29(5): 417-429 (2003) - [c1]Stacy J. Prowell:
JUMBL: A Tool for Model-Based Statistical Testing. HICSS 2003: 337 - 2000
- [j2]Stacy J. Prowell:
TML: a description language for Markov chain usage models. Inf. Softw. Technol. 42(12): 835-844 (2000)
1990 – 1999
- 1998
- [j1]Stacy J. Prowell, Jesse H. Poore:
Sequence-Based Software Specification of Deterministic Systems. Softw. Pract. Exp. 28(3): 329-344 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint