Automated security patch and vulnerability remediation tool for electric utilities Q Li, F Zhang, P Huff US Patent App. 16/150,042, 2019 | 37 | 2019 |
A recommender system for tracking vulnerabilities P Huff, K McClanahan, T Le, Q Li Proceedings of the 16th International Conference on Availability …, 2021 | 20 | 2021 |
A machine learning-based approach for automated vulnerability remediation analysis F Zhang, P Huff, K McClanahan, Q Li 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 19 | 2020 |
Towards automated assessment of vulnerability exposures in security operations P Huff, Q Li Security and Privacy in Communication Networks: 17th EAI International …, 2021 | 7 | 2021 |
Improving the efficiency of capture-resistant biometric authentication based on set intersection X Wang, PD Huff, BC Tjaden 2008 Annual Computer Security Applications Conference (ACSAC), 140-149, 2008 | 5 | 2008 |
Assessment of the Distributed Ledger Technology for Energy Sector Industrial and Operational Applications Using the MITRE ATT&CK® ICS Matrix A Lee, SNG Gourisetti, DJ Sebastian-Cardenas, K Lambert, V Navarro, ... IEEE Access, 2023 | 4 | 2023 |
A distributed ledger for non-attributable cyber threat intelligence exchange P Huff, Q Li Security and Privacy in Communication Networks: 17th EAI International …, 2021 | 3 | 2021 |
Cyber Arena: An Open-Source Solution for Scalable Cybersecurity Labs in the Cloud P Huff, S Leiterman, JP Springer Proceedings of the 54th ACM Technical Symposium on Computer Science …, 2023 | 2 | 2023 |
HELOT–Hunting Evil Life in Operational Technology S Akailvi, U Gautam, P Bhandari, H Rashid, PD Huff, JP Springer IEEE Transactions on Smart Grid, 2022 | 2 | 2022 |
Assessing Cybersecurity Resilience of Distributed Ledger Technology in Energy Sector Using the MITRE ATT&CK® ICS Framework SNG Gourisetti, A Lee, R Reddi, K Isirova, M Touhiduzzaman, ... 2022 IEEE 1st Global Emerging Technology Blockchain Forum: Blockchain …, 2022 | 2 | 2022 |
Fuzzy Extractors Using an Improved Set Intersection Function PD Huff Technical Report, James Madison University, Computer Science, USA, 2008 | 2 | 2008 |
Towards Automating the Assessment of Software Vulnerability Risk PD Huff, Q Li EAI Endorsed Transactions on Security and Safety 8 (27), e3, 2020 | | 2020 |