Follow
Pablo Moriano
Title
Cited by
Cited by
Year
Factors in an end user security expertise instrument
P Rajivan, P Moriano, T Kelley, LJ Camp
Information & Computer Security 25 (2), 190-205, 2017
682017
Addressing the lack of comparability & testing in CAN intrusion detection research: A comprehensive guide to CAN IDS data & introduction of the ROAD dataset
ME Verma, MD Iannacone, RA Bridges, SC Hollifield, P Moriano, B Kay, ...
arXiv preprint arXiv:2012.14600, 2020
292020
Insider threat event detection in user-system interactions
P Moriano, J Pendleton, S Rich, LJ Camp
Proceedings of the 2017 International Workshop on Managing Insider Security …, 2017
292017
Time-based can intrusion detection benchmark
DH Blevins, P Moriano, RA Bridges, ME Verma, MD Iannacone, ...
arXiv preprint arXiv:2101.05781, 2021
192021
Community-based event detection in temporal networks
P Moriano, J Finke, YY Ahn
Scientific reports 9 (1), 4358, 2019
192019
Using bursty announcements for detecting BGP routing anomalies
P Moriano, R Hill, LJ Camp
Computer Networks 188, 107835, 2021
182021
On the formation of structure in growing networks
P Moriano, J Finke
Journal of Statistical Mechanics: Theory and Experiment 2013 (06), P06010, 2013
182013
Modelado y control de un nuevo sistema bola viga con levitación magnética
P Moriano, F Naranjo
Revista iberoamericana de automática e informática industrial 9 (3), 249-258, 2012
162012
Lessons learnt from comparing {WhatsApp} privacy concerns across saudi and indian populations
J Dev, P Moriano, LJ Camp
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 81-97, 2020
122020
Stopping the Insider at the Gates: Protecting Organizational Assets through Graph Mining.
P Moriano, J Pendleton, S Rich, LJ Camp
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (1), 4-29, 2018
112018
What Can Johnny Do?–Factors in an End-User Expertise Instrument.
P Rajivan, P Moriano, T Kelley, LJ Camp
HAISA, 199-208, 2016
92016
Detecting can masquerade attacks with signal clustering similarity
P Moriano, RA Bridges, MD Iannacone
arXiv preprint arXiv:2201.02665, 2022
82022
Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies
P Moriano, S Achar, LJ Camp
Computers & Security 70, 319-334, 2017
82017
Power-law weighted networks from local attachments
P Moriano, J Finke
Europhysics Letters 99 (1), 18002, 2012
72012
Dissemination of scholarly literature in social media
P Moriano, E Ferrara, A Flammini, F Menczer
Altmetric. org, 2014
62014
Graph-based machine learning improves just-in-time defect prediction
J Bryan, P Moriano
Plos one 18 (4), e0284077, 2023
52023
Canshield: Signal-based intrusion detection for controller area networks
MH Shahriar, Y Xiao, P Moriano, W Lou, YT Hou
arXiv preprint arXiv:2205.01306, 2022
52022
Data Reduction.
R Zhang, A Malviya-Thakur, J Borreguero, P Peterson, R Whitfield, ...
Encyclopedia of Database Systems, 621-626, 2009
52009
Anomaly detection in real-world temporal networks
PM Salazar
Indiana University, 2019
42019
Macroeconomic analysis of routing anomalies
P Moriano, S Achar, LJ Camp
TPRC, 2016
32016
The system can't perform the operation now. Try again later.
Articles 1–20