Justin M. Beaver
Justin M. Beaver
Distinguished Research Fellow, Lirio LLC
Verified email at lirio.com
Cited by
Cited by
Machine learning for power system disturbance and cyber-attack discrimination
RCB Hink, JM Beaver, MA Buckner, T Morris, U Adhikari, S Pan
2014 7th International symposium on resilient control systems (ISRCS), 1-8, 2014
An evaluation of machine learning methods to detect malicious SCADA communications
JM Beaver, RC Borges-Hink, MA Buckner
2013 12th international conference on machine learning and applications 2, 54-59, 2013
The effects of development team skill on software product quality
JM Beaver, GA Schiavone
ACM SIGSOFT Software Engineering Notes 31 (3), 1-5, 2006
Nonparametric semi-supervised learning for network intrusion detection: combining performance improvements with realistic in-situ training
CT Symons, JM Beaver
Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012
A learning system for discriminating variants of malicious network traffic
JM Beaver, CT Symons, RE Gillen
Proceedings of the Eighth Annual Cyber Security and Information Intelligence …, 2013
A stigmergy approach for open source software developer community simulation
X Cui, J Beaver, J Treadwell, T Potok, L Pullum
2009 International Conference on Computational Science and Engineering 4 …, 2009
An information fusion framework for threat assessment
JM Beaver, RA Kerekes, JN Treadwell
2009 12th International Conference on Information Fusion, 1903-1910, 2009
In-situ trainable intrusion detection system
CT Symons, JM Beaver, R Gillen, TE Potok
US Patent 9,497,204, 2016
Predicting software suitability using a bayesian belief network
JM Beaver, GA Schiavone, JS Berrios
Fourth International Conference on Machine Learning and Applications (ICMLA …, 2005
Modeling success in FLOSS project groups
JM Beaver, X Cui, JL St Charles, TE Potok
Proceedings of the 5th international Conference on Predictor Models in …, 2009
Dimensionality reduction particle swarm algorithm for high dimensional clustering
X Cui, JM Beaver, JS Charles, TE Potok
2008 IEEE Swarm Intelligence Symposium, 1-6, 2008
Matisse: A visual analytics system for exploring emotion trends in social media text streams
CA Steed, M Drouhard, J Beaver, J Pyle, PL Bogen
2015 IEEE International Conference on Big Data (Big Data), 807-814, 2015
Host-based data exfiltration detection via system call sequences
B Jewell, J Beaver
ICIW2011-Proceedings of the 6th International Conference on Information …, 2011
Text stream trend analysis using multiscale visual analytics with applications to social media systems
CA Steed, J Beaver, II Bogen, DM PL, J Pyle
ACM IUI workshop on visual text analytics, 2015
Visualization techniques for computer network defense
JM Beaver, CA Steed, RM Patton, X Cui, M Schultz
Sensors, and Command, Control, Communications, and Intelligence (C3I …, 2011
How do information security workers use host data? A summary of interviews with security analysts
RA Bridges, MD Iannacone, JR Goodall, JM Beaver
arXiv preprint arXiv:1812.02867, 2018
Hierarchical clustering and visualization of aggregate cyber data
RM Patton, JM Beaver, CA Steed, TE Potok, JN Treadwell
2011 7th International Wireless Communications and Mobile Computing …, 2011
An approach to the automated determination of host information value
JM Beaver, RM Patton, TE Potok
2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS …, 2011
A life cycle software quality model using bayesian belief networks
J Beaver
The swarm model in open source software developer communities
X Cui, J Beaver, E Stiles, L Pullum, B Klump, J Treadwell, T Potok
2010 IEEE Second International Conference on Social Computing, 656-660, 2010
The system can't perform the operation now. Try again later.
Articles 1–20