[go: up one dir, main page]

Follow
Frederick T. Sheldon
Frederick T. Sheldon
Professor
Verified email at uidaho.edu - Homepage
Title
Cited by
Cited by
Year
Blockchain: properties and misconceptions
D Conte de Leon, AQ Stalick, AA Jillepalli, MA Haney, FT Sheldon
Asia Pacific Journal of Innovation and Entrepreneurship 11 (3), 286-300, 2017
2632017
IoT intrusion detection using machine learning with a novel high performing feature selection method
K Albulayhi, Q Abu Al-Haija, SA Alsuhibany, AA Jillepalli, ...
Applied Sciences 12 (10), 5015, 2022
1882022
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning
M Ashrafuzzaman, S Das, Y Chakhchoukh, S Shiva, FT Sheldon
Computers & Security 97, 101994, 2020
1622020
A survey of crypto ransomware attack detection methodologies: An evolving outlook
A Alqahtani, FT Sheldon
Sensors 22 (5), 1837, 2022
1412022
IoT intrusion detection taxonomy, reference architecture, and analyses
K Albulayhi, AA Smadi, FT Sheldon, RK Abercrombie
Sensors 21 (19), 6432, 2021
1352021
Network intrusion detection and comparative analysis using ensemble machine learning and feature selection
S Das, S Saha, AT Priyoti, EK Roy, FT Sheldon, A Haque, S Shiva
IEEE transactions on network and service management 19 (4), 4821-4833, 2021
1252021
Metrics for maintainability of class inheritance hierarchies
FT Sheldon, K Jerath, H Chung
Journal of Software Maintenance and Evolution: Research and Practice 14 (3 …, 2002
1172002
Detecting stealthy false data injection attacks in power grids using deep learning
M Ashrafuzzaman, Y Chakhchoukh, AA Jillepalli, PT Tosic, DC de Leon, ...
2018 14th International Wireless Communications & Mobile Computing …, 2018
1012018
Reliability measurement: From theory to practice
FT Sheldon, KM Kavi, RC Tausworthe, JT Yu, R Brettschneider, ...
IEEE Software 9 (4), 13-20, 1992
801992
Quantifying security threats and their potential impacts: a case study
AB Aissa, RK Abercrombie, FT Sheldon, A Mili
Innovations in Systems and Software Engineering 6 (4), 269-281, 2010
762010
A methodology to evaluate agent oriented software engineering techniques
CE Lin, KM Kavi, FT Sheldon, KM Daley, RK Abercrombie
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
752007
Isaac: The idaho cps smart grid cybersecurity testbed
IA Oyewumi, AA Jillepalli, P Richardson, M Ashrafuzzaman, BK Johnson, ...
2019 IEEE Texas Power and Energy Conference (TPEC), 1-6, 2019
722019
The insecurity of wireless networks
FT Sheldon, JM Weber, SM Yoo, WD Pan
IEEE Security & Privacy 10 (4), 54-61, 2012
692012
Access control in fog computing: Challenges and research agenda
MA Aleisa, A Abuhussein, FT Sheldon
IEEE Access 8, 83986-83999, 2020
622020
Empirical evaluation of the ensemble framework for feature selection in ddos attack
S Das, D Venugopal, S Shiva, FT Sheldon
2020 7th IEEE International Conference on Cyber Security and Cloud Computing …, 2020
562020
Opportunities for early detection and prediction of ransomware attacks against industrial control systems
M Gazzan, FT Sheldon
Future Internet 15 (4), 144, 2023
532023
An adaptive deep-ensemble anomaly-based intrusion detection system for the internet of things
K Albulayhi, FT Sheldon
2021 IEEE world AI IoT congress (AIIoT), 0187-0196, 2021
522021
A short survey on quantum computers
Y Kanamori, SM Yoo, WD Pan, FT Sheldon
International Journal of Computers and Applications 28 (3), 227-233, 2006
512006
Systematic review of recommendation systems for course selection
S Algarni, F Sheldon
Machine Learning and Knowledge Extraction 5 (2), 560-596, 2023
482023
Taxonomy and survey of interpretable machine learning method
S Das, N Agarwal, D Venugopal, FT Sheldon, S Shiva
2020 IEEE Symposium Series on Computational Intelligence (SSCI), 670-677, 2020
482020
The system can't perform the operation now. Try again later.
Articles 1–20