Adam Slagell
Adam Slagell
ESnet Energy Sciences Network
Verified email at - Homepage
Cited by
Cited by
Adapting bro into scada: building a specification-based intrusion detection system for the dnp3 protocol
H Lin, A Slagell, C Di Martino, Z Kalbarczyk, RK Iyer
Proceedings of the Eighth Annual Cyber Security and Information Intelligence …, 2013
Runtime semantic security analysis to detect and mitigate control-related attacks in power grids
H Lin, A Slagell, ZT Kalbarczyk, PW Sauer, RK Iyer
IEEE Transactions on Smart Grid 9 (1), 163-178, 2016
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs.
AJ Slagell, K Lakkaraju, K Luo
LISA 6, 3-8, 2006
Sharing computer network logs for security and privacy: A motivation for new methodologies of anonymization
A Slagell, W Yurcik
Workshop of the 1st International Conference on Security and Privacy for …, 2005
Semantic security analysis of SCADA networks to detect malicious control commands in power grids
H Lin, A Slagell, Z Kalbarczyk, PW Sauer, RK Iyer
Proceedings of the first ACM workshop on Smart energy grid security, 29-34, 2013
The design of VisFlowConnect-IP: a link analysis system for IP security situational awareness
X Yin, W Yurcik, A Slagell
Third IEEE International Workshop on Information Assurance (IWIA'05), 141-153, 2005
Closing-the-loop in nvisionip: Integrating discovery and search in security visualizations
K Lakkaraju, R Bearavolu, A Slagell, W Yurcik, S North
IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 75-82, 2005
A survey of PKI components and scalability issues
A Slagell, R Bonilla, W Yurcik
2006 IEEE International Performance Computing and Communications Conference …, 2006
A taxonomy and adversarial model for attacks against network log anonymization
J King, K Lakkaraju, A Slagell
Proceedings of the 2009 ACM symposium on Applied Computing, 1286-1293, 2009
Credential Wallets: A Classification of Credential Repositories Highlighting MyProxy
WJ Yurcik, RF Bonilla, A Stagell, J Basney
TPRC, 2003
Preemptive intrusion detection: Theoretical framework and real-world measurements
P Cao, E Badger, Z Kalbarczyk, R Iyer, A Slagell
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-12, 2015
Evaluating the utility of anonymized network traces for intrusion detection
K Lakkaraju, A Slagell
Proceedings of the 4th international conference on Security and privacy in …, 2008
Sharing network logs for computer forensics: A new tool for the anonymization of netflow records
AJ Slagell, Y Li, K Luo
Workshop of the 1st International Conference on Security and Privacy for …, 2005
Sels: a secure e-mail list service
H Khurana, A Slagell, R Bonilla
Proceedings of the 2005 ACM symposium on Applied computing, 306-313, 2005
Network log anonymization: Application of crypto-pan to cisco netflows
A Slagell, J Wang, W Yurcik
Proceedings of the Workshop on Secure Knowledge Management 2004, 2004
The bro network security monitor
V Paxson, R Sommer, S Hall, C Kreibich, J Barlow, G Clark, G Maier, ...
Bro. org.[Online]. Available: https://www. bro. org/.[Accessed: 10-Mar-2017], 2017
Canine: A combined conversion and anonymization tool for processing netflows for security
Y Li, A Slagell, K Luo, W Yurcik
International conference on telecommunication systems modeling and analysis 21, 2005
Known-plain text attack against a permutation based video encryption algorithm
JA Slagell
Security, 1-10, 2004
VisFlowConnect-IP: an animated link analysis tool for visualizing netflows
X Yin, W Yurcik, A Slagell
FLOCON-Network Flow Analysis Workshop (Network Flow Analysis for Security …, 2005
SCRUB-PA: A multi-level multi-dimensional anonymization tool for process accounting
K Luo, Y Li, C Ermopoulos, W Yurcik, A Slagell
arXiv preprint cs/0601079, 2006
The system can't perform the operation now. Try again later.
Articles 1–20