Follow
Frederick T. Sheldon
Title
Cited by
Cited by
Year
Blockchain: properties and misconceptions
DC de Leon, AQ Stalick, AA Jillepalli, MA Haney, FT Sheldon
Asia Pacific Journal of Innovation and Entrepreneurship, 2017
1422017
Metrics for maintainability of class inheritance hierarchies
FT Sheldon, K Jerath, H Chung
Journal of Software Maintenance and Evolution: Research and Practice 14 (3 …, 2002
1112002
Reliability measurement: From theory to practice
FT Sheldon, KM Kavi, RC Tausworthe, JT Yu, R Brettschneider, ...
IEEE Software 9 (4), 13-20, 1992
741992
Quantifying security threats and their potential impacts: a case study
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Innovations in Systems and Software Engineering 6 (4), 269-281, 2010
672010
A methodology to evaluate agent oriented software engineering techniques
CE Lin, KM Kavi, FT Sheldon, KM Daley, RK Abercrombie
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
672007
The insecurity of wireless networks
FT Sheldon, JM Weber, SM Yoo, WD Pan
IEEE Security & Privacy 10 (4), 54-61, 2012
552012
Detecting stealthy false data injection attacks in power grids using deep learning
M Ashrafuzzaman, Y Chakhchoukh, AA Jillepalli, PT Tosic, DC de Leon, ...
2018 14th International Wireless Communications & Mobile Computing …, 2018
462018
Methodology for evaluating security controls based on key performance indicators and stakeholder mission
FT Sheldon, RK Abercrombie, A Mili
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
382009
Defining and computing a value based cyber-security measure
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Information Systems and e-Business Management 10 (4), 433-453, 2012
372012
A short survey on quantum computers
Y Kanamori, SM Yoo, WD Pan, FT Sheldon
International Journal of Computers and Applications 28 (3), 227-233, 2006
362006
Reliability analysis of CSP specifications using Petri nets and Markov processes
KM Kavi, FT Sheldon, B Shirazi, AR Hurson
Proceedings of the Twenty-Eighth Annual Hawaii International Conference on …, 1995
351995
VIPAR: Advanced Information Agents discovering knowledge in an open and changing environment
T Potok, M Elmore, J Reed, FT Sheldon
Proc. 7th World Multiconference on Systemics, Cybernetics and Informatics …, 2003
332003
Risk assessment for industrial control systems quantifying availability using mean failure cost (MFC)
Q Chen, RK Abercrombie, FT Sheldon
Journal of Artificial Intelligence and Soft Computing Research 5, 2015
322015
Risk assessment methodology based on the NISTIR 7628 guidelines
RK Abercrombie, FT Sheldon, KR Hauser, MW Lantz, A Mili
2013 46th Hawaii International Conference on System Sciences, 1802-1811, 2013
312013
Moving toward trustworthy systems: R&D Essentials
FT Sheldon, C Vishik
Computer 43 (9), 31-40, 2010
302010
Specification, safety and reliability analysis using Stochastic Petri Net models
FT Sheldon, S Greiner, M Benzinger
Tenth International Workshop on Software Specification and Design. IWSSD-10 …, 2000
302000
A data integrity verification scheme in mobile cloud computing
C Lin, Z Shen, Q Chen, FT Sheldon
Journal of Network and Computer Applications 77, 146-151, 2017
292017
Cyberspace security system
RK Abercrombie, FT Sheldon, EM Ferragut
US Patent 8,762,188, 2014
292014
Evaluating security controls based on key performance indicators and stakeholder mission
FT Sheldon, RK Abercrombie, A Mili
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
292008
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning
M Ashrafuzzaman, S Das, Y Chakhchoukh, S Shiva, FT Sheldon
Computers & Security 97, 101994, 2020
282020
The system can't perform the operation now. Try again later.
Articles 1–20