Chris Strasburg
Chris Strasburg
Ph.D. Candidate, Iowa State University
Verified email at
Cited by
Cited by
A framework for cost sensitive assessment of intrusion response selection
C Strasburg, N Stakhanova, S Basu, JS Wong
2009 33rd Annual IEEE international computer software and applications …, 2009
Are change metrics good predictors for an evolving software product line?
S Krishnan, C Strasburg, RR Lutz, K Goševa-Popstojanova
Proceedings of the 7th international conference on predictive models in …, 2011
Intrusion response cost assessment methodology
C Strasburg, N Stakhanova, S Basu, JS Wong
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
Predicting failure-proneness in an evolving software product line
S Krishnan, C Strasburg, RR Lutz, K Goseva-Popstojanova, KS Dorman
Information and Software Technology 55 (8), 1479-1495, 2013
Towards cost-sensitive assessment of intrusion response selection
N Stakhanova, C Strasburg, S Basu, JS Wong
Journal of computer security 20 (2-3), 169-198, 2012
The methodology for evaluating response cost for intrusion response systems
C Strasburg, N Stakhanova, J Wong, S Basu
Masquerade detection in network environments
C Strasburg, S Krishnan, K Dorman, S Basu, JS Wong
2010 10th IEEE/IPSJ International Symposium on Applications and the Internet …, 2010
S-MAIDS: a semantic model for automated tuning, correlation, and response selection in intrusion detection systems
C Strasburg, S Basu, JS Wong
2013 IEEE 37th Annual Computer Software and Applications Conference, 319-328, 2013
A framework for cost-sensitive automated selection of intrusion response
CR Strasburg
Iowa State University, 2009
A Cross-Domain Comparable Measurement Framework to Quantify Intrusion Detection Effectiveness
C Strasburg, S Basu, J Wong
Proceedings of the 11th Annual Cyber and Information Security Research …, 2016
CS573x Project--The Behavior of Q-Learning in a Dramatically Dynamic Environment
C Strasburg
A Pragmatic Approach to Intrusion Response Metrics
C Strasburg, J Wong
Threats, Countermeasures, and Advances in Applied Information Security, 1-22, 2012
Dynamic Whitelist Generation for Automated Response
C Strasburg, J Adams
The system can't perform the operation now. Try again later.
Articles 1–13