Techniques for the dynamic randomization of network attributes AR Chavez, WMS Stout, S Peisert Security Technology (ICCST), 2015 International Carnahan Conference on, 1-6, 2015 | 49 | 2015 |
Challenges to securing the Internet of Things WMS Stout, VE Urias 2016 IEEE International Carnahan Conference on Security Technology (ICCST), 1-8, 2016 | 48 | 2016 |
Operational cost of deploying Moving Target Defenses defensive work factors B Van Leeuwen, WMS Stout, V Urias MILCOM 2015-2015 IEEE Military Communications Conference, 966-971, 2015 | 43 | 2015 |
Cyber Range Infrastructure Limitations and Needs of Tomorrow: A Position Paper VE Urias, WMS Stout, B Van Leeuwen, H Lin 2018 International Carnahan Conference on Security Technology (ICCST), 1-5, 2018 | 39 | 2018 |
Computer network deception as a moving target defense VE Urias, WMS Stout, C Loverro 2015 International Carnahan Conference on Security Technology (ICCST), 1-6, 2015 | 28 | 2015 |
Dynamic defense and network randomization for computer systems AR Chavez, WMS Stout, JR Hamlet, EJ Lee, MT Martin US Patent 9,985,984, 2018 | 27 | 2018 |
Gathering threat intelligence through computer network deception VE Urias, WMS Stout, HW Lin 2016 IEEE Symposium on Technologies for Homeland Security (HST), 1-6, 2016 | 25 | 2016 |
Cybersecurity Assessments on Emulated DER Communication Networks I Onunkwo, B Wright, P Cordeiro, N Jacobs, C Lai, J Johnson, T Hutchins, ... Sandia Technical Report, 2018 | 22 | 2018 |
Network randomization and dynamic defense for critical infrastructure systems A Chavez, J Hamlet, E Lee, M Martin, W Stout Sandia National Laboratories Report—SAND2015-3324 13, 2015 | 20 | 2015 |
Emulytics at Sandia National Laboratories. BJ Wright, V Urias, BP Van Leeuwen, W Stout Sandia National Lab.(SNL-NM), Albuquerque, NM (United States), 2015 | 18* | 2015 |
Technologies to enable cyber deception VE Urias, WMS Stout, JL Watson, C Grim, L Liebrock, M Merza 2017 International Carnahan Conference on Security Technology (ICCST), 1-6, 2017 | 17 | 2017 |
Dynamic cybersecurity training environments for an evolving cyber workforce VE Urias, B Van Leeuwen, WMS Stout, HW Lin 2017 IEEE International Symposium on Technologies for Homeland Security (HST …, 2017 | 15 | 2017 |
Hypervisor Assisted Forensics and Incident Response in the Cloud VE Urias, WMS Stout, C Loverro, JW Young 2016 IEEE International Conference on Computer and Information Technology …, 2016 | 10 | 2016 |
Emulytics at Sandia National Laboratories V Urias, B Van Leeuwen, W Stout, B Wright MODSIM World 2015, 2015 | 9 | 2015 |
Cloud forensics and incident response platform V Urias, C Loverro, WMS Stout US Patent 11,113,388, 2021 | 8 | 2021 |
Applying a Threat Model to Cloud Computing VE Urias, B Van Leeuwen, WMS Stout, H Lin 2018 International Carnahan Conference on Security Technology (ICCST), 1-5, 2018 | 8 | 2018 |
MTD assessment framework with cyber attack modeling B Van Leeuwen, W Stout, V Urias 2016 IEEE International Carnahan Conference on Security Technology (ICCST), 1-8, 2016 | 8 | 2016 |
2018 international carnahan conference on security technology iccst VE Urias, WMS Stout, B Van Leeuwen, H Lin Cyber range infrastructure limitations and needs of tomorrow: A position …, 2018 | 7 | 2018 |
Artificial Diversity and Defense Security (ADDSec) Final Report. AR Chavez, J Hamlet, W Stout Sandia National Lab.(SNL-NM), Albuquerque, NM (United States), 2018 | 7 | 2018 |
Computer network defense system V Urias, WMS Stout, C Loverro US Patent 9,742,804, 2017 | 6 | 2017 |