Follow
Philip Huff
Title
Cited by
Cited by
Year
Automated security patch and vulnerability remediation tool for electric utilities
Q Li, F Zhang, P Huff
US Patent App. 16/150,042, 2019
362019
A recommender system for tracking vulnerabilities
P Huff, K McClanahan, T Le, Q Li
Proceedings of the 16th International Conference on Availability …, 2021
192021
A machine learning-based approach for automated vulnerability remediation analysis
F Zhang, P Huff, K McClanahan, Q Li
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
192020
Towards automated assessment of vulnerability exposures in security operations
P Huff, Q Li
Security and Privacy in Communication Networks: 17th EAI International …, 2021
72021
Improving the efficiency of capture-resistant biometric authentication based on set intersection
X Wang, PD Huff, BC Tjaden
2008 Annual Computer Security Applications Conference (ACSAC), 140-149, 2008
52008
A distributed ledger for non-attributable cyber threat intelligence exchange
P Huff, Q Li
Security and Privacy in Communication Networks: 17th EAI International …, 2021
32021
Assessment of the Distributed Ledger Technology for Energy Sector Industrial and Operational Applications Using the MITRE ATT&CK® ICS Matrix
A Lee, SNG Gourisetti, DJ Sebastian-Cardenas, K Lambert, V Navarro, ...
IEEE Access, 2023
22023
Cyber Arena: An Open-Source Solution for Scalable Cybersecurity Labs in the Cloud
P Huff, S Leiterman, JP Springer
Proceedings of the 54th ACM Technical Symposium on Computer Science …, 2023
22023
HELOT–Hunting Evil Life in Operational Technology
S Akailvi, U Gautam, P Bhandari, H Rashid, PD Huff, JP Springer
IEEE Transactions on Smart Grid, 2022
22022
Assessing Cybersecurity Resilience of Distributed Ledger Technology in Energy Sector Using the MITRE ATT&CK® ICS Framework
SNG Gourisetti, A Lee, R Reddi, K Isirova, M Touhiduzzaman, ...
2022 IEEE 1st Global Emerging Technology Blockchain Forum: Blockchain …, 2022
22022
Fuzzy Extractors Using an Improved Set Intersection Function
PD Huff
Technical Report, James Madison University, Computer Science, USA, 2008
22008
Towards Automating the Assessment of Software Vulnerability Risk
PD Huff, Q Li
EAI Endorsed Transactions on Security and Safety 8 (27), e3, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–12