Map Home
Type / to search with text or keywords
/
keyboard shortcut: Type "/" on your keyboard for a quick search
Search button
Loading...
Loading...
Scroll left
Grants
Citations
H-Index
Patents
News
Books
Scroll right
Collapse sidebar
Data issues & feedback
Adjust height of sidebar
KMap
People
Adjust height of sidebar
KMap
Profile
Mark Patton
Senior Lecturer, Management Information Systems
Management Information Systems
Full Page
Overview
Research
More
Collaboration
(12)
Salim Hariri
Mutual work: 2 Grants﹒12 Proposals
Collaboration Details
Hsinchun Chen
Mutual work: 5 Grants﹒25 Publications﹒32 Proposals
Collaboration Details
Peter Troch
Mutual work: 1 Grant﹒3 Proposals
Collaboration Details
Beichuan Zhang
Mutual work: 2 Grants﹒6 Proposals
Collaboration Details
Jay Nunamaker
Mutual work: 1 Publication
Collaboration Details
Page 1 of 3
Previous page
Next page
Grants
(5)
Sign in to view all grants
Publications
(22)
Recent
True News Versus Fake News: How Information Spreads Online
2020
media,
online communication,
information spread,
trustworthiness,
social media
Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach
2020
cybersecurity,
graph embedding,
vulnerability assessment,
unsupervised learning,
scientific infrastructure
Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach
2020
cybersecurity,
graph embedding,
github repositories,
unsupervised learning,
scientific cyberinfrastructure
How Does Information Spread? An Exploratory Study of True and Fake News
2019
information propagation,
fake news,
social media,
information diffusion,
network analysis
Dark Net Ecosystem Cyber Threat Intelligence Tool
2019
dark net,
cyber threat,
ecosystem,
intelligence tool,
cybersecurity
Performance Modeling of Hyperledger Sawtooth Blockchain
2019
blockchain,
performance,
modeling,
hyperledger,
sawtooth
Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System CPS) Resiliency
2018
cyber-physical systems,
vulnerability assessment,
resiliency,
benchmarking,
enhanced security
Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study
2018
cybersecurity,
threat intelligence,
hacker forums,
exploit collection,
data classification
Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions
2018
cybersecurity,
higher education,
automated reporting,
vulnerability assessment,
remediation
Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things
2018
scada systems,
internet of things,
vulnerabilities,
security,
networks