Personal information

Activities

Works (6)

Malware classification through Abstract Syntax Trees and L-moments

Computers & Security
2025-01 | Journal article
Contributors: Anthony J. Rose; Christine M. Schubert Kabban; Scott R. Graham; Wayne C. Henry; Christopher M. Rondeau
Source: check_circle
Crossref

ScriptBlock Smuggling: Uncovering Stealthy Evasion Techniques in PowerShell and .NET Environments

Journal of Cybersecurity and Privacy
2024-03-25 | Journal article
Contributors: Anthony J. Rose; Scott R. Graham; Christine M. Schubert Kabban; Jacob J. Krasnov; Wayne C. Henry
Source: check_circle
Crossref

Quantifying DDS-cerberus network control overhead

The Journal of Supercomputing
2023-03 | Journal article
Contributors: Andrew T. Park; Nathaniel Peck; Richard Dill; Douglas D. Hodson; Michael R. Grimaila; Wayne C. Henry
Source: check_circle
Crossref

Distribution of DDS-cerberus authenticated facial recognition streams

The Journal of Supercomputing
2023-02 | Journal article
Contributors: Andrew T. Park; Nathaniel Peck; Richard Dill; Douglas D. Hodson; Michael R. Grimaila; Wayne C. Henry
Source: check_circle
Crossref

Identification of Return-Oriented Programming Attacks Using RISC-V Instruction Trace Data

IEEE Access
2022 | Journal article
Contributors: Daniel F. Koranek; Scott R. Graham; Brett J. Borghetti; Wayne C. Henry
Source: check_circle
Crossref

SensorRE: Provenance support for software reverse engineers

Computers & Security
2020-08 | Journal article
Contributors: Wayne C. Henry; Gilbert L. Peterson
Source: check_circle
Crossref