Follow
Frederick T. Sheldon
Title
Cited by
Cited by
Year
Blockchain: properties and misconceptions
D Conte de Leon, AQ Stalick, AA Jillepalli, MA Haney, FT Sheldon
Asia Pacific Journal of Innovation and Entrepreneurship 11 (3), 286-300, 2017
1732017
Metrics for maintainability of class inheritance hierarchies
FT Sheldon, K Jerath, H Chung
Journal of Software Maintenance and Evolution: Research and Practice 14 (3 …, 2002
1112002
Reliability measurement: From theory to practice
FT Sheldon, KM Kavi, RC Tausworthe, JT Yu, R Brettschneider, ...
IEEE Software 9 (4), 13-20, 1992
751992
Quantifying security threats and their potential impacts: a case study
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Innovations in Systems and Software Engineering 6, 269-281, 2010
702010
A methodology to evaluate agent oriented software engineering techniques
CE Lin, KM Kavi, FT Sheldon, KM Daley, RK Abercrombie
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
672007
Detecting stealthy false data injection attacks in power grids using deep learning
M Ashrafuzzaman, Y Chakhchoukh, AA Jillepalli, PT Tosic, DC de Leon, ...
2018 14th International Wireless Communications & Mobile Computing …, 2018
582018
The insecurity of wireless networks
FT Sheldon, JM Weber, SM Yoo, WD Pan
IEEE Security & Privacy 10 (4), 54-61, 2012
582012
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning
M Ashrafuzzaman, S Das, Y Chakhchoukh, S Shiva, FT Sheldon
Computers & Security 97, 101994, 2020
522020
Methodology for evaluating security controls based on key performance indicators and stakeholder mission
FT Sheldon, RK Abercrombie, A Mili
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
422009
A short survey on quantum computers
Y Kanamori, SM Yoo, WD Pan, FT Sheldon
International Journal of Computers and Applications 28 (3), 227-233, 2006
412006
Defining and computing a value based cyber-security measure
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Proceedings of the Second Kuwait Conference on e-Services and e-Systems, 1-9, 2011
382011
Isaac: The idaho cps smart grid cybersecurity testbed
IA Oyewumi, AA Jillepalli, P Richardson, M Ashrafuzzaman, BK Johnson, ...
2019 IEEE Texas Power and Energy Conference (TPEC), 1-6, 2019
352019
A data integrity verification scheme in mobile cloud computing
C Lin, Z Shen, Q Chen, FT Sheldon
journal of Network and Computer Applications 77, 146-151, 2017
352017
Reliability analysis of CSP specifications using Petri nets and Markov processes
KM Kavi, FT Sheldon, B Shirazi, AR Hurson
Proceedings of the Twenty-Eighth Annual Hawaii International Conference on …, 1995
351995
VIPAR: Advanced Information Agents discovering knowledge in an open and changing environment
T Potok, M Elmore, J Reed, FT Sheldon
Proc. 7th World Multiconference on Systemics, Cybernetics and Informatics …, 2003
342003
Risk assessment for industrial control systems quantifying availability using mean failure cost (MFC)
Q Chen, RK Abercrombie, FT Sheldon
Journal of Artificial Intelligence and Soft Computing Research 5 (3), 205-220, 2015
332015
Cyberspace security system
RK Abercrombie, FT Sheldon, EM Ferragut
US Patent 8,762,188, 2014
332014
Specification, safety and reliability analysis using Stochastic Petri Net models
FT Sheldon, S Greiner, M Benzinger
Tenth International Workshop on Software Specification and Design. IWSSD-10 …, 2000
322000
Moving toward trustworthy systems: R&D Essentials
FT Sheldon, C Vishik
Computer 43 (9), 31-40, 2010
312010
Risk assessment methodology based on the NISTIR 7628 guidelines
RK Abercrombie, FT Sheldon, KR Hauser, MW Lantz, A Mili
2013 46th Hawaii International Conference on System Sciences, 1802-1811, 2013
302013
The system can't perform the operation now. Try again later.
Articles 1–20