Follow
David Manz
David Manz
Cyber Security Scientist
Verified email at pnnl.gov
Title
Cited by
Cited by
Year
Research methods for cyber security
TW Edgar, DO Manz
Syngress, 2017
3792017
Exploratory study
TW Edgar, DO Manz
Research methods for cyber security 29, 95-130, 2017
1482017
A communication–computation efficient group key algorithm for large and dynamic groups
S Zheng, D Manz, J Alves-Foss
Computer Networks 51 (1), 69-93, 2007
652007
Chapter 6-machine learning
TW Edgar, DO Manz
Research methods for cyber security, 153-173, 2017
432017
Gamification for measuring cyber security situational awareness
G Fink, D Best, D Manz, V Popovsky, B Endicott-Popovsky
Foundations of Augmented Cognition: 7th International Conference, AC 2013 …, 2013
402013
Chapter 2-science and cyber security
TW Edgar, DO Manz
Research methods for cyber security, 33-62, 2017
372017
PCA: memory leak detection using partial call-path analysis
W Li, H Cai, Y Sui, D Manz
Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020
262020
Design and implementation of a multi-use attack-defend computer security lab
S Caltagirone, P Ortman, S Melton, D Manz, K King, P Oman
Proceedings of the 39th Annual Hawaii International Conference on System …, 2006
242006
Towards an experimental testbed facility for cyber-physical security research
T Edgar, D Manz, T Carroll
Proceedings of the Seventh Annual Workshop on Cyber Security and Information …, 2011
222011
Chapter 3—Starting Your Research
TW Edgar, DO Manz
Research methods for cyber security, 63-92, 2017
172017
Realizing scientific methods for cyber security
TE Carroll, D Manz, T Edgar, FL Greitzer
Proceedings of the 2012 Workshop on Learning from Authoritative Security …, 2012
172012
Network simulation of group key management protocols
D Manz, J Alves-Foss, S Zheng
Journal of Information Assurance and Security 3 (1), 67-79, 2008
172008
Chapter 5-descriptive study
TW Edgar, DO Manz
Research methods for cyber security, 131-151, 2017
142017
Convenience sampling
TW Edgar, DO Manz
Research methods for cyber security, 2017
132017
Risk-informed autonomous adaptive cyber controllers
A Veeramany, WJ Hutton III, S Sridhar, SNG Gourisetti, GA Coles, MJ Rice, ...
US Patent 11,206,278, 2021
102021
Applied Experimentation
T Edgar, D Manz
Research Methods for Cyber Security, 271-297, 2019
102019
Security and performance of group key agreement protocols
S Zheng, D Manz, J Alves-Foss, Y Chen
IASTED International Conference on Networks and Communication Systems, 321-327, 2006
102006
Reverse engineering integrated circuits using finite state machine analysis
J Smith, K Oler, C Miller, D Manz
92017
RADICL: A Reconfigurable Attack-Defend Instructional Computing Laboratory.
S Caltagirone, P Ortman, S Melton, D Manz, K King, PW Oman
Security and Management, 97-103, 2005
92005
A cyber secure communication architecture for multi-site hardware_in_the_loop Co_simulation of DER control
SNG Gourisetti, J Hansen, W Hofer, D Manz, K Kalsi, J Fuller, S Niddodi, ...
2018 Resilience Week (RWS), 55-62, 2018
82018
The system can't perform the operation now. Try again later.
Articles 1–20