Institutional Knowledge Map (KMap)
Map
Services
How To Use
About
Toggle theme
Loading...
Menu
Mark Patton
Senior Lecturer, Management Information Systems
Management Information Systems
Map Page
Research Area
cybersecurity,
vulnerability assessment,
network security,
internet of things,
scholarship,
scada systems,
dark web,
anonymity,
scada,
security
Grants
(5)
CyberCorps Scholarship for Service (Renewal): The AZSecure Program Empowering Cybersecurity through Artificial Intelligence
Active
·
2024
·
$0 / $1.3M
·
External
Co-Investigator (COI)
cybersecurity,
artificial intelligence,
scholarship,
renewal,
empowerment
Cybersecurity Scholarship-for-Service Renewal at The University of Arizona: The AZSecure SFS Program
Active
·
2019
·
$358.5K / $3.6M
·
External
Co-Investigator (COI)
cybersecurity,
scholarship,
renewal,
university,
program
CICI: SSC: Proactive Cyber Threat Intelligence and Comprehensive Network Monitoring for Scientific Cyberinfrastructure: The AZSecure Framework
Active
·
2019
·
$49.9K / $998K
·
External
Co-Investigator (COI)
cyber threat intelligence,
monitoring network,
scientific cyberinfrastructure,
azsecure framework,
proactive security
CIF21 DIBBs: DIBBs for Intelligence and Security Informatics Research Community
2014
·
$0 / $1.5M
·
External
Co-Investigator (COI)
cybersecurity,
intelligence,
data analysis,
information technology,
community building
Cybersecurity Scholarship-for-Service at the University of Arizona
2013
·
$531.3K / $5.3M
·
External
Co-Investigator (COI)
cybersecurity,
scholarship,
university,
service,
arizona
Publications
(22)
Recent
True News Versus Fake News: How Information Spreads Online
2020
media,
online communication,
information spread,
trustworthiness,
social media
Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach
2020
cybersecurity,
graph embedding,
vulnerability assessment,
unsupervised learning,
scientific infrastructure
Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach
2020
cybersecurity,
graph embedding,
github repositories,
unsupervised learning,
scientific cyberinfrastructure
Performance Modeling of Hyperledger Sawtooth Blockchain
2019
blockchain,
performance,
modeling,
hyperledger,
sawtooth
Dark-Net Ecosystem Cyber-Threat Intelligence CTI) Tool
2019
cybersecurity,
threat intelligence,
dark web,
ecosystem analysis,
tool development
How Does Information Spread? An Exploratory Study of True and Fake News
2019
information propagation,
fake news,
social media,
information diffusion,
network analysis
Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study
2018
cybersecurity,
threat intelligence,
hacker forums,
exploit collection,
data classification
Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions
2018
cybersecurity,
higher education,
automated reporting,
vulnerability assessment,
remediation
Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things
2018
scada systems,
internet of things,
vulnerabilities,
security,
networks
Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System CPS) Resiliency
2018
cyber-physical systems,
vulnerability assessment,
resiliency,
benchmarking,
enhanced security
Collaborations
(12)
Salim Hariri
Mutual work: 12 Proposals﹒2 Grants
Collaboration Details
Hsinchun Chen
Mutual work: 32 Proposals﹒5 Grants﹒25 Publications
Collaboration Details
Peter Troch
Mutual work: 1 Grant﹒3 Proposals
Collaboration Details
Beichuan Zhang
Mutual work: 2 Grants﹒6 Proposals
Collaboration Details
Jay Nunamaker
Mutual work: 1 Publication
Collaboration Details
Page 1 of 3
Previous page
Next page
News
(3)
UArizona Researchers Go on Offense, Defense in Battle Against Hackers
2019
Cybersecurity Students Benefit From Scholarship Program
2019
$5.4M in Cybersecurity Grants Awarded to UA Regents' Professor Hsinchun Chen
2013
Courses
(8)
Computers and Internetworked Society
Information Security, Risk Mgmt, Disaster Recovery
Cyber Threat Intelligence
Business Intensive I
Information Security Risk Management
Page 1 of 2
Previous page
Next page
Techs/Patents
(1)
Embodied Conversational Agent-Based Kiosk for Automated Interviewing
2012
·
Technology
10+ Collaborators
$939.7K / $12.7M Funding
4+ Grants
20+ Publications
7+ Courses