


default search action
Scott R. Graham
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j22]Anthony J. Rose
, Christine M. Schubert-Kabban
, Scott R. Graham
, Wayne C. Henry
, Christopher M. Rondeau
:
Malware classification through Abstract Syntax Trees and L-moments. Comput. Secur. 148: 104082 (2025) - 2024
- [j21]Tor J. Langehaug
, Scott R. Graham
:
CuMONITOR: Continuous Monitoring of Microarchitecture for Software Task Identification and Classification. DTRAP 5(3): 22:1-22:22 (2024) - [j20]Anthony J. Rose
, Scott R. Graham
, Christine M. Schubert-Kabban
, Jacob J. Krasnov
, Wayne C. Henry
:
ScriptBlock Smuggling: Uncovering Stealthy Evasion Techniques in PowerShell and .NET Environments. J. Cybersecur. Priv. 4(2): 153-166 (2024) - 2023
- [j19]Aydin Aysu
, Scott R. Graham
:
Introduction to the Special Issue on the Digital Threats of Hardware Security. DTRAP 4(2): 16:1-16:2 (2023) - [j18]Tor J. Langehaug
, Brett J. Borghetti, Scott R. Graham
:
Classifying Co-resident Computer Programs Using Information Revealed by Resource Contention. DTRAP 4(2): 17:1-17:29 (2023) - [j17]Anthony Rose
, Scott R. Graham
, Jacob J. Krasnov
:
IronNetInjector: Weaponizing .NET Dynamic Language Runtime Engines. DTRAP 4(3): 40:1-40:23 (2023) - [c34]Tor J. Langehaug, Scott R. Graham:
Towards Hardware-Based Application Fingerprinting with Microarchitectural Signals for Zero Trust Environments. HICSS 2023: 6613-6622 - 2022
- [j16]Tor J. Langehaug
, Scott R. Graham
, Christine M. Schubert-Kabban, Brett J. Borghetti:
MADFAM: MicroArchitectural Data Framework and Methodology. IEEE Access 10: 23511-23531 (2022) - [j15]Daniel J. Koranek
, Scott R. Graham
, Brett J. Borghetti
, Wayne C. Henry
:
Identification of Return-Oriented Programming Attacks Using RISC-V Instruction Trace Data. IEEE Access 10: 45347-45364 (2022) - [c33]Samuel Chadwick, Scott R. Graham, James Dean, Matthew Dallmeyer:
Leveraging Confidential Computing to Enable Secure Information Sharing. Critical Infrastructure Protection 2022: 235-252 - [c32]Calvin Muramoto, Scott R. Graham, Stephen Dunlap:
Evaluating the Use of Boot Image Encryption on the TALOS II Architecture. Critical Infrastructure Protection 2022: 253-273 - [c31]Noah Diamond, Scott R. Graham, Gilbert Clark:
Securing Infiniband Traffic with Bluefield-2 Data Processing Units. Critical Infrastructure Protection 2022: 277-300 - 2021
- [j14]Paul Simon
, Scott R. Graham
, Christopher Talbot, Micah Hayden:
Model for Quantifying the Quality of Secure Service. J. Cybersecur. Priv. 1(2): 289-301 (2021) - [j13]Paul M. Simon
, Scott R. Graham
:
Extending the Quality of Secure Service Model to Multi-Hop Networks. J. Cybersecur. Priv. 1(4): 793-803 (2021) - [j12]Justin C. Tullos
, Scott R. Graham
, Jeremy D. Jordan, Pranav R. Patel
:
SPARC: Statistical Performance Analysis With Relevance Conclusions. IEEE Open J. Comput. Soc. 2: 117-129 (2021) - [c30]Robert Mellish, Scott R. Graham
, Stephen Dunlap, Patrick Sweeney:
Anomaly Detection in Automation Controllers. Critical Infrastructure Protection 2021: 97-118 - [c29]Kyle Hintze, Scott R. Graham
, Stephen Dunlap, Patrick Sweeney:
InfiniBand Network Monitoring: Challenges and Possibilities. Critical Infrastructure Protection 2021: 187-208 - 2020
- [c28]Jake Magness, Patrick Sweeney, Scott R. Graham
, Nicholas Kovach:
Simulation-Based Logic Bomb Identification and Verification for Unmanned Aerial Vehicles. Critical Infrastructure Protection 2020: 25-44 - [c27]Dillon Pettit, Scott R. Graham
:
Assessing the Cyber Risk of Small Unmanned Aerial Vehicles. Critical Infrastructure Protection 2020: 45-67 - [c26]David Crow, Scott R. Graham
, Brett J. Borghetti, Patrick Sweeney:
Engaging Empirical Dynamic Modeling to Detect Intrusions in Cyber-Physical Systems. Critical Infrastructure Protection 2020: 111-133 - [c25]Micah Hayden, Scott R. Graham
, Addison Betances, Robert F. Mills:
Multi-channel Security Through Data Fragmentation. Critical Infrastructure Protection 2020: 137-155 - [c24]Lucas Mireles, Scott R. Graham
, Patrick Sweeney, Stephen Dunlap, Matthew Dallmeyer:
Securing an InfiniBand Network and its Effect on Performance. Critical Infrastructure Protection 2020: 157-179
2010 – 2019
- 2019
- [j11]Christopher W. Badenhop, Scott R. Graham
, Barry E. Mullins, Logan O. Mailloux:
Looking Under the Hood of Z-Wave: Volatile Memory Introspection for the ZW0301 Transceiver. ACM Trans. Cyber Phys. Syst. 3(2): 20:1-20:24 (2019) - [c23]Rahn Lassiter, Scott R. Graham, Timothy J. Carbino, Stephen Dunlap:
Electronic Control Unit Discrimination Using Wired Signal Distinct Native Attributes. Critical Infrastructure Protection 2019: 103-121 - [c22]Kenneth Hacker, Scott R. Graham, Stephen Dunlap:
Vehicle Identification and Route Reconstruction via TPMS Data Leakage. Critical Infrastructure Protection 2019: 123-136 - [c21]Luis Cintron, Scott R. Graham, Douglas D. Hodson, Barry E. Mullins:
Modeling Liability Data Collection Systems for Intelligent Transportation Infrastructure Using Hyperledger Fabric. Critical Infrastructure Protection 2019: 137-156 - [c20]Daryl Schmitt, Scott R. Graham, Patrick Sweeney, Robert F. Mills:
Vulnerability Assessment of InfiniBand Networking. Critical Infrastructure Protection 2019: 179-205 - [i1]Brent J. Stone, Scott R. Graham, Barry E. Mullins, Christine M. Schubert-Kabban:
Unsupervised Time Series Extraction from Controller Area Network Payloads. CoRR abs/1904.03078 (2019) - 2018
- [j10]Steven M. Beyer
, Barry E. Mullins, Scott R. Graham
, Jason M. Bindewald
:
Pattern-of-Life Modeling in Smart Homes. IEEE Internet Things J. 5(6): 5317-5325 (2018) - [c19]Daniel Celebucki, Maj Alan Lin, Scott R. Graham
:
A security evaluation of popular Internet of Things protocols for manufacturers. ICCE 2018: 1-6 - [c18]Clark Wolfe, Scott R. Graham
, Robert Mills, Scott Nykl, Paul Simon:
Securing Data in Power-Limited Sensor Networks Using Two-Channel Communications. Critical Infrastructure Protection 2018: 81-90 - [c17]Daniel Celebucki, Scott R. Graham
, Sanjeev Gunawardena:
Reversing a Lattice ECP3 FPGA for Bitstream Protection. Critical Infrastructure Protection 2018: 91-111 - [c16]Karl Bentjen, Scott R. Graham
, Scott Nykl:
Persistent Human Control in a Reservation-Based Autonomous Intersection Protocol. Critical Infrastructure Protection 2018: 197-212 - [c15]Brent C. Nolan, Scott R. Graham
, Barry E. Mullins, Christine M. Schubert-Kabban:
Unsupervised Time Series Extraction from Controller Area Network Payloads. VTC Fall 2018: 1-5 - 2017
- [j9]Christopher W. Badenhop, Scott R. Graham
, Benjamin W. P. Ramsey, Barry E. Mullins, Logan O. Mailloux:
The Z-Wave routing protocol and its security implications. Comput. Secur. 68: 112-129 (2017) - [j8]Jose A. Gutierrez del Arroyo
, Jason M. Bindewald
, Scott R. Graham
, Mason Rice:
Enabling Bluetooth Low Energy auditing through synchronized tracking of multiple connections. Int. J. Crit. Infrastructure Prot. 18: 58-70 (2017) - [c14]John M. Willis, Robert F. Mills, Logan O. Mailloux, Scott R. Graham
:
Considerations for secure and resilient satellite architectures. CyCon U.S. 2017: 16-22 - 2016
- [c13]Paul M. Simon, Scott R. Graham
:
Comparison of Real-Time, Mobile Data Bus Architectures. IRI 2016: 484-489 - 2012
- [j7]D. F. Harmon, M. Brent Reynolds, Scott R. Graham
, Kenneth M. Hopkinson:
Integrating disruption-prone links into reliable networks: a transmission control protocol friendly approach. IET Commun. 6(12): 1702-1709 (2012) - [j6]Mark P. Kleeman, Benjamin A. Seibert, Gary B. Lamont, Kenneth M. Hopkinson, Scott R. Graham
:
Solving Multicommodity Capacitated Network Design Problems Using Multiobjective Evolutionary Algorithms. IEEE Trans. Evol. Comput. 16(4): 449-471 (2012) - 2011
- [j5]Nikolaos M. Freris, Scott R. Graham
, P. R. Kumar:
Fundamental Limits on Synchronizing Clocks Over Networks. IEEE Trans. Autom. Control. 56(6): 1352-1364 (2011) - [j4]Larry C. Llewellyn, Kenneth M. Hopkinson, Scott R. Graham
:
Distributed Fault-Tolerant Quality of Wireless Networks. IEEE Trans. Mob. Comput. 10(2): 175-190 (2011)
2000 – 2009
- 2009
- [j3]Thomas C. Ford, John M. Colombi
, David R. Jacques, Scott R. Graham
:
On the application of classification concepts to systems engineering design and evaluation. Syst. Eng. 12(2): 141-154 (2009) - [j2]Scott R. Graham
, Girish Baliga, P. R. Kumar:
Abstractions, Architecture, Mechanisms, and a Middleware for Networked Control. IEEE Trans. Autom. Control. 54(7): 1490-1503 (2009) - 2008
- [c12]Mark E. Coyne, Scott R. Graham
, Kenneth M. Hopkinson, Stuart H. Kurkowski:
A methodology for unit testing actors in proprietary discrete event based simulations. WSC 2008: 1012-1019 - [c11]J. Mark Belue, Stuart H. Kurkowski, Scott R. Graham
, Kenneth M. Hopkinson, Ryan W. Thomas, Joshua W. Abernathy:
Research and analysis of simulation-based networks through multi-objective visualization. WSC 2008: 1216-1224 - 2007
- [c10]Mark P. Kleeman, Gary B. Lamont, Kenneth M. Hopkinson, Scott R. Graham
:
Solving Multicommodity Capacitated Network Design Problems using a Multiobjective Evolutionary Algorithm. CISDA 2007: 33-41 - [c9]Mark P. Kleeman, Gary B. Lamont, Kenneth M. Hopkinson, Scott R. Graham
:
Multiobjective evolutionary algorithms for designing capacitated network centric communications. GECCO 2007: 905 - [c8]Justin T. Kautz, Barry E. Mullins, Rusty O. Baldwin, Scott R. Graham
:
An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks. HICSS 2007: 292 - 2006
- [c7]Girish Baliga, Scott R. Graham, Carl A. Gunter, Panganamala R. Kumar:
Reducing Risk by Managing Software Related Failures in Networked Control Systems. CDC 2006: 2866-2871 - 2005
- [c6]Girish Baliga, Scott R. Graham
, P. R. Kumar:
Middleware and Abstractions in the Convergence of Control with Communication and Computation. CDC/ECC 2005: 4245-4250 - [c5]Sumant Kowshik, Girish Baliga, Scott R. Graham
, Lui Sha:
Co-Design Based Approach to Improve Robustness in Networked Control Systems. DSN 2005: 454-463 - 2004
- [b1]Scott R. Graham:
Issues in the Convergence of Control With Communication and Computation. University of Illinois Urbana-Champaign, USA, 2004 - [j1]Girish Baliga, Scott R. Graham, Lui Sha, P. R. Kumar:
Service Continuity in Networked Control Using Etherware. IEEE Distributed Syst. Online 5(9) (2004) - [c4]Scott R. Graham, Girish Baliga, R. R. Kumar:
Issues in the convergence of control with communication and computing: proliferation, architecture, design, services, and middleware. CDC 2004: 1466-1471 - [c3]Scott R. Graham, P. R. Kumar:
Time in general-purpose control systems: the Control Time Protocol and an experimental evaluation. CDC 2004: 4004-4009 - [c2]Girish Baliga, Scott R. Graham
, Lui Sha, P. R. Kumar:
Etherware: Domainware for Wireless Control Networks. ISORC 2004: 155-162 - 2003
- [c1]Scott R. Graham, P. R. Kumar:
The Convergence of Control, Communication, and Computation. PWC 2003: 458-475
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint