Follow
Robert Abercrombie
Robert Abercrombie
Prime Time Computing, LLC
Verified email at ieee.org - Homepage
Title
Cited by
Cited by
Year
Quantifying security threats and their potential impacts: a case study
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Innovations in Systems and Software Engineering 6, 269-281, 2010
702010
A methodology to evaluate agent oriented software engineering techniques
CE Lin, KM Kavi, FT Sheldon, KM Daley, RK Abercrombie
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
672007
A study of scientometric methods to identify emerging technologies via modeling of milestones
RK Abercrombie, AW Udoeyop, BG Schlicher
Scientometrics 91 (2), 327-342, 2012
422012
Methodology for evaluating security controls based on key performance indicators and stakeholder mission
FT Sheldon, RK Abercrombie, A Mili
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
422009
Defining and computing a value based cyber-security measure
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Proceedings of the Second Kuwait Conference on e-Services and e-Systems, 1-9, 2011
382011
Method and system for determining a volume of an object from two-dimensional images
RK Abercrombie, BG Schlicher
US Patent 7,773,773, 2010
372010
Risk assessment for industrial control systems quantifying availability using mean failure cost (MFC)
Q Chen, RK Abercrombie, FT Sheldon
Journal of Artificial Intelligence and Soft Computing Research 5 (3), 205-220, 2015
332015
Cyberspace security system
RK Abercrombie, FT Sheldon, EM Ferragut
US Patent 8,762,188, 2014
332014
System and method for identifying, validating, weighing and characterizing moving or stationary vehicles and cargo
DL Beshears, SG Batsell, RK Abercrombie, MB Scudiere, CP White
US Patent 7,305,324, 2007
332007
Risk assessment methodology based on the NISTIR 7628 guidelines
RK Abercrombie, FT Sheldon, KR Hauser, MW Lantz, A Mili
2013 46th Hawaii International Conference on System Sciences, 1802-1811, 2013
302013
Evaluating security controls based on key performance indicators and stakeholder mission
FT Sheldon, RK Abercrombie, A Mili
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
292008
Security management of cyber physical control systems using NIST SP 800-82r2
AA Jillepalli, FT Sheldon, DC de Leon, M Haney, RK Abercrombie
2017 13th International Wireless Communications and Mobile Computing …, 2017
272017
Managing complex IT security processes with value based measures
RK Abercrombie, FT Sheldon, A Mili
2009 IEEE Symposium on Computational Intelligence in Cyber Security, 69-75, 2009
232009
OPNET/simulink based testbed for disturbance detection in the smart grid
MAH Sadi, MH Ali, D Dasgupta, RK Abercrombie
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
202015
Synopsis of evaluating security controls based on key performance indicators and stakeholder mission value
RK Abercrombie, FT Sheldon, A Mili
2008 11th IEEE High Assurance Systems Engineering Symposium, 479-482, 2008
202008
IoT intrusion detection taxonomy, reference architecture, and analyses
K Albulayhi, AA Smadi, FT Sheldon, RK Abercrombie
Sensors 21 (19), 6432, 2021
192021
Towards reducing the data exfiltration surface for the insider threat
BG Schlicher, LP MacIntyre, RK Abercrombie
2016 49th Hawaii International Conference on System Sciences (HICSS), 2749-2758, 2016
172016
A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance-Applying Cyber Security Econometrics System (CSES) to Mission Assurance Analysis …
RK Abercrombie, FT Sheldon, MR Grimaila
2010 IEEE Second International Conference on Social Computing, 1153-1158, 2010
152010
System and method for implementing and monitoring a cyberspace security econometrics system and other complex systems
RK Abercrombie, FT Sheldon, A Mili
US Patent App. 12/421,933, 2009
152009
Co-simulation platform for characterizing cyber attacks in cyber physical systems
MAH Sadi, MH Ali, D Dasgupta, RK Abercrombie, S Kher
2015 IEEE Symposium Series on Computational Intelligence, 1244-1251, 2015
142015
The system can't perform the operation now. Try again later.
Articles 1–20