Follow
Stacy Prowell
Title
Cited by
Cited by
Year
Cleanroom software engineering: technology and process
SJ Prowell, CJ Trammell, RC Linger, JH Poore
Pearson Education, 1999
3751999
Modeling inter-signal arrival times for accurate detection of can bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection
MR Moore, RA Bridges, FL Combs, MS Starr, SJ Prowell
Proceedings of the 12th Annual Conference on Cyber and Information Security …, 2017
1702017
Foundations of sequence-based software specification
SJ Prowell, JH Poore
IEEE transactions on Software Engineering 29 (5), 417-429, 2003
1352003
JUMBL: A tool for model-based statistical testing
SJ Prowell
36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003
1132003
Using markov chain usage models to test complex systems
SJ Prowell
Proceedings of the 38th Annual Hawaii International Conference on System …, 2005
642005
Computing system reliability using Markov chain usage models
SJ Prowell, JH Poore
Journal of Systems and Software 73 (2), 219-225, 2004
642004
TML: A description language for Markov chain usage models
SJ Prowell
Information and Software Technology 42 (12), 835-844, 2000
452000
Sequence‐based software specification of deterministic systems
SJ Prowell, JH Poore
Software: Practice and Experience 28 (3), 329-345, 1998
431998
Seven deadliest network attacks
S Prowell, R Kraus, M Borkin
Elsevier, 2010
412010
Tools, techniques, and methodologies: A survey of digital forensics for scada systems
RA Awad, S Beztchi, JM Smith, B Lyles, S Prowell
Proceedings of the 4th Annual Industrial Control System Security Workshop, 1-8, 2018
382018
Computations for Markov chain usage models
SJ Prowell
Computer Science Technical Report, 2003
342003
The impact of function extraction technology on next-generation software engineering
A Hevner, R Linger, R Collins, M Pleszkoch, S Prowell, G Walton
Technical Report CMU/SEI-2005-TR-015, 2005
332005
Towards malware detection via cpu power consumption: Data collection design and analytics
R Bridges, JH Jiménez, J Nichols, K Goseva-Popstojanova, S Prowell
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
322018
Use of thermistor temperature sensors for cyber-physical system security
C Labrado, H Thapliyal, S Prowell, T Kuruganti
Sensors 19 (18), 3905, 2019
312019
Sequence-based software specification
SJ Prowell
The University of Tennessee, 1996
271996
The impact of requirements changes on specifications and state machines
L Lin, SJ Prowell, JH Poore
Software: Practice and Experience 39 (6), 573-610, 2009
262009
An axiom system for sequence-based specification
L Lin, SJ Prowell, JH Poore
Theoretical Computer Science 411 (2), 360-376, 2010
182010
System and method for key generation in security tokens
PG Evans, TS Humble, NR Paul, RC Pooser, SJ Prowell
US Patent 9,172,698, 2015
172015
Phase-space detection of cyber events
JM Hernández, A Ferber, S Prowell, L Hively
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
172015
Automatic clustering of malware variants based on structured control flow
SJ Prowell, KD Sayre, RL Awad
US Patent App. 15/172,884, 2016
162016
The system can't perform the operation now. Try again later.
Articles 1–20