default search action
Travis Atkison
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Andrew Renninger, Sinan Ameen Noman, Travis Atkison, Jonah Sussman:
Live Intersection Data Acquisition for Traffic Simulators (LIDATS). Sensors 24(11): 3392 (2024) - [c27]Kelvin Ovabor, Travis Atkison:
Exploring Firefly and Greywolf Algorithms for Multi-objective Optimization in Wireless Sensor Networks. ACM Southeast Regional Conference 2024: 241-246 - 2023
- [c26]Chen Wang, Travis Atkison, Qiuhua Duan:
Advancing Short-Term Traffic Congestion Prediction: Navigating Challenges in Learning-Based Approaches. ICAI (2) 2023: 3-13 - 2022
- [j12]Reed Milewicz, Jeffrey C. Carver, Samuel Grayson, Travis Atkison:
A Secure Future for Open-Source Computational Science and Engineering. Comput. Sci. Eng. 24(4): 65-69 (2022) - [i3]Muhammad Sami Irfan, Mizanur Rahman, Travis Atkison, Sagar Dasgupta, Alexander M. Hainen:
Reinforcement Learning based Cyberattack Model for Adaptive Traffic Signal Controller in Connected Transportation Systems. CoRR abs/2211.01845 (2022) - [i2]Reed Milewicz, Jeffrey C. Carver, Samuel Grayson, Travis Atkison:
A Secure Future for Open-Source Computational Science and Engineering. CoRR abs/2211.06343 (2022) - 2021
- [j11]Michael Lee, Travis Atkison:
VANET applications: Past, present, and future. Veh. Commun. 28: 100310 (2021) - [i1]Sagar Dasgupta, Courtland Hollis, Mizanur Rahman, Travis Atkison:
An Innovative Attack Modelling and Attack Detection Approach for a Waiting Time-based Adaptive Traffic Signal Controller. CoRR abs/2108.08627 (2021) - 2020
- [j10]James Palmer, Victor S. Sheng, Travis Atkison, Bernard Chen:
Classification on grade, price, and region with multi-label and multi-target methods in wineinformatics. Big Data Min. Anal. 3(1): 1-12 (2020) - [j9]Naima Islam, Md Abu Sufian Talukder, Alex Hainen, Travis Atkison:
Characterizing co-modality in urban transit systems from a passengers' perspective. Public Transp. 12(2): 405-430 (2020)
2010 – 2019
- 2019
- [c25]Chen Wang, Aibek Musaev, Pezhman Sheinidashtegol, Travis Atkison:
Towards Detection of Abnormal Vehicle Behavior Using Traffic Cameras. BigData 2019: 125-136 - [c24]Michael Lee, Beichen Yang, Travis Atkison:
802.11ac and p in a Simulated VANET Environment. IEEE BigData 2019: 3797-3802 - [c23]Pezhman Sheinidashtegol, Aibek Musaev, Travis Atkison:
Investigating Personally Identifiable Information Posted on Twitter Before and After Disasters. SERVICES 2019: 31-45 - [d1]Mahran Al-Zyoud, Jeffrey C. Carver, Nathan Culmer, Travis Atkison:
Privacy Challenges and Solutions in Smart Health: A Systematic Literature Review Extraction Forms. Zenodo, 2019 - 2018
- [j8]Travis Atkison, Stanislav Ponomarev, Randy K. Smith, Bernard Chen:
Feature Extraction Optimization for Network Intrusion Detection in Control System Networks. Int. J. Netw. Secur. 20(5): 853-861 (2018) - [j7]Md Shariful Haque, Travis Atkison:
A Forensic Enabled Data Provenance Model for Public Cloud. J. Digit. Forensics Secur. Law 13(3): 47-66 (2018) - [c22]Thomas Willingham, Cody Henderson, Blair Kiel, Md Shariful Haque, Travis Atkison:
Testing vulnerabilities in bluetooth low energy. ACM Southeast Regional Conference 2018: 6:1-6:7 - [c21]Vidya Nakade, Aibek Musaev, Travis Atkison:
Preliminary research on thesaurus-based query expansion for Twitter data extraction. ACM Southeast Regional Conference 2018: 14:1-14:4 - [c20]Md Shariful Haque, Jeff Carver, Travis Atkison:
Causes, impacts, and detection approaches of code smell: a survey. ACM Southeast Regional Conference 2018: 25:1-25:8 - 2017
- [j6]Nathan Wallace, Travis Atkison:
On the detection of cyber-events in the grid using PCA. Int. J. Crit. Infrastructures 13(2/3): 96-112 (2017) - [j5]Travis Atkison, Nathan Wallace:
A Power Grid Incident Identification Based on Physically Derived Cyber-Event Detection. J. Digit. Forensics Secur. Law 12(2): 5-18 (2017) - [j4]Bernard Chen, Hai Le, Travis Atkison, Dongsheng Che:
A Wineinformatics Study for White-box Classification Algorithms to Understand and Evaluate Wine Judges. Trans. Mach. Learn. Data Min. 10(1): 3-24 (2017) - [c19]Sweta Mahaju, Travis Atkison:
Evaluation of Firefox Browser Forensics Tools. ACM Southeast Regional Conference 2017: 5-12 - [c18]Amanda Lee, Travis Atkison:
A Comparison of Fuzzy Hashes: Evaluation, Guidelines, and Future Suggestions. ACM Southeast Regional Conference 2017: 18-25 - [c17]Matthew Leeds, Miclain Keffeler, Travis Atkison:
A Comparison of Features for Android Malware Detection. ACM Southeast Regional Conference 2017: 63-68 - [c16]Arpan Man Sainju, Travis Atkison:
An Experimental Analysis of Windows Log Events Triggered by Malware. ACM Southeast Regional Conference 2017: 195-198 - [c15]Bernard Chen, Krizia Houston Buck, Caleb Lawrence, Christopher Moore, Jeremy Yeatts, Travis Atkison:
Granular computing in wineinformatics. ICNC-FSKD 2017: 1228-1232 - 2016
- [j3]Stanislav Ponomarev, Travis Atkison:
Industrial Control System Network Intrusion Detection by Telemetry Analysis. IEEE Trans. Dependable Secur. Comput. 13(2): 252-260 (2016) - 2014
- [c14]Nathan Wallace, Stanislav Ponomarev, Travis Atkison:
A dimensional transformation scheme for power grid cyber event detection. CISR 2014: 13-16 - [c13]Stanislav Ponomarev, Nathan Wallace, Travis Atkison:
Detection of SSH host spoofing in control systems through network telemetry analysis. CISR 2014: 21-24 - 2013
- [c12]Nathan Wallace, Travis Atkison:
Observing industrial control system attacks launched via metasploit framework. ACM Southeast Regional Conference 2013: 22:1-22:4 - [c11]James Poore, Juan Carlos Flores Cruz, Travis Atkison:
Evolution of digital forensics in virtualization by using virtual machine introspection. ACM Southeast Regional Conference 2013: 30:1-30:6 - [c10]Sean Semple, Stanislav Ponomarev, Jan Durand, Travis Atkison:
Applying static analysis to high-dimensional malicious application detection. ACM Southeast Regional Conference 2013: 31:1-31:5 - [c9]Stanislav Ponomarev, Jan Durand, Nathan Wallace, Travis Atkison:
Evaluation of Random Projection for Malware Classification. SERE (Companion) 2013: 68-73 - 2012
- [j2]Peng Shao, Travis Atkison, Nicholas A. Kraft, Randy K. Smith:
Combining lexical and structural information for static bug localisation. Int. J. Comput. Appl. Technol. 44(1): 61-71 (2012) - [c8]Juan Carlos Flores Cruz, Travis Atkison:
Evolution of traditional digital forensics in virtualization. ACM Southeast Regional Conference 2012: 18-23 - [c7]Jan Durand, Travis Atkison:
Applying random projection to the classification of malicious applications using data mining algorithms. ACM Southeast Regional Conference 2012: 286-291 - 2011
- [j1]Jan Durand, Juan Flores, Travis Atkison, Nicholas A. Kraft, Randy K. Smith:
Using Executable Slicing to Improve Rogue Software Detection Algorithms. Int. J. Secur. Softw. Eng. 2(2): 53-64 (2011) - [c6]Jan Durand, Travis Atkison:
Using randomized projection techniques to aid in detecting high-dimensional malicious applications. ACM Southeast Regional Conference 2011: 166-172 - [c5]Juan Carlos Flores Cruz, Travis Atkison:
Digital forensics on a virtual machine. ACM Southeast Regional Conference 2011: 326-327 - 2010
- [c4]Travis Atkison:
Aiding prediction algorithms in detecting high-dimensional malicious applications using a randomized projection technique. ACM Southeast Regional Conference 2010: 80
2000 – 2009
- 2009
- [c3]Travis Atkison:
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications. ACM Southeast Regional Conference 2009 - 2001
- [c2]Travis Atkison, Kathleen Pensy, Charles K. Nicholas, David S. Ebert, Rebekah Atkison, Chris Morris:
Case Study: Visualization and Information Retrieval Techniques for Network Intrusion Detection. VisSym 2001: 283-290 - 2000
- [c1]Lee A. Butler, Travis Atkison, Ethan L. Miller:
Comparing CPU Performance Between and Within Processor Families. Int. CMG Conference 2000: 421-430
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-09 00:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint