Anomaly detection in automobile control network data with long short-term memory networks A Taylor, S Leblanc, N Japkowicz 2016 IEEE international conference on data science and advanced analytics …, 2016 | 466 | 2016 |
Frequency-based anomaly detection for the automotive CAN bus A Taylor, N Japkowicz, S Leblanc 2015 World Congress on Industrial Control Systems Security (WCICSS), 45-49, 2015 | 335 | 2015 |
Risks associated with usb hardware trojan devices used by insiders J Clark, S Leblanc, S Knight 2011 IEEE International Systems Conference, 201-208, 2011 | 158 | 2011 |
Taxonomy of cyber attacks and simulation of their effects IM Chapman, SP Leblanc, A Partington Proceedings of the 2011 Military Modeling & Simulation Symposium, 73-80, 2011 | 50 | 2011 |
Compromise through usb-based hardware trojan horse device J Clark, S Leblanc, S Knight Future Generation Computer Systems 27 (5), 555-563, 2011 | 44 | 2011 |
An overview of cyber attack and computer network operations simulation SP Leblanc, A Partington, I Chapman, M Bernier Proceedings of the 2011 Military Modeling & Simulation Symposium, 92-100, 2011 | 43 | 2011 |
Probing the limits of anomaly detectors for automobiles with a cyberattack framework A Taylor, S Leblanc, N Japkowicz IEEE Intelligent Systems 33 (2), 54-62, 2018 | 33 | 2018 |
Attacking OMG data distribution service (DDS) based real-time mission critical distributed systems MJ Michaud, T Dean, SP Leblanc 2018 13th International conference on malicious and unwanted software …, 2018 | 27 | 2018 |
Collective Views of the NSA/CSS Cyber Defense Exercise on Curricula and Learning Objectives. WJ Adams, E Gavas, TH Lacey, SP Leblanc CSET, 2009 | 25 | 2009 |
Hardware trojan horse device based on unintended usb channels J Clark, S Leblanc, S Knight 2009 Third International Conference on Network and System Security, 1-8, 2009 | 24 | 2009 |
Using clone detection to find malware in acrobat files S Karademir, T Dean, S Leblanc Proceedings of the 2013 Conference of the Center for Advanced Studies on …, 2013 | 20 | 2013 |
A constraint-based intrusion detection system MDS Hasan, T Dean, FT Imam, F Garcia, SP Leblanc, M Zulkernine Proceedings of the Fifth European Conference on the Engineering of Computer …, 2017 | 16 | 2017 |
Metrics framework of cyber operations on command and control M Bernier, S Leblanc, B Morton, E Filiol, R Erra Proceedings of the 11th European Conference on Information Warfare and …, 2012 | 15 | 2012 |
Reliability estimation of hierarchical software systems SP Leblanc, PA Roman Annual Reliability and Maintainability Symposium. 2002 Proceedings (Cat. No …, 2002 | 15 | 2002 |
Cognitive biases in cyber decision-making A Lemay, S Leblanc Proceedings of the 13th International Conference on Cyber Warfare and …, 2018 | 14 | 2018 |
When not to pull the plug–the need for network counter-surveillance operations S Knight, S Leblanc Cryptology and information security series 3, 226-237, 2009 | 9 | 2009 |
Is eval () Evil: A study of JavaScript in PDF malware A Lemay, SP Leblanc 2018 13th International Conference on Malicious and Unwanted Software …, 2018 | 6 | 2018 |
Lessons from the strategic corporal: Implications of cyber incident response A Lemay, SP Leblanc, T De Jesus Proceedings of the 2015 ACM SIGMIS Conference on Computers and People …, 2015 | 5 | 2015 |
Project Management: An Engineering Economics Perspective S Leblanc, P Roman Pearson Custom Publishing, 2005 | 4 | 2005 |
An application of network security monitoring to the MIL-STD-1553B data bus CA Bernard | 3 | 2019 |